Internet of Things security
Citations
1,743 citations
553 citations
Cites background from "Internet of Things security"
...However, data gathered by IoT devices may contain confidential and private information, and many security threats have emerged that aim to exploit the weaknesses of current IoT infrastructures [4]....
[...]
543 citations
537 citations
476 citations
References
12,539 citations
9,593 citations
6,131 citations
5,295 citations
"Internet of Things security" refers background in this paper
...The incorporation of detection innovations in passive RFID tags would enable completely novel functions in the IoT application domain, particularly in tracking locations and movement and monitoring temperature (Atzori et al., 2010)....
[...]
...The IoT has drawn attention recently because of the expansion of appliances connected to the Internet (Whitmore, and Atzori et al., 2015, 2010)....
[...]
...Atzori et al. (2010) introduced a model of mutual trust in the system security in the IoT by developing an item-level access-control framework....
[...]
...A wireless communication channel utilizes radio communication, transmitters, and receivers for the data exchange between two or more devices (Atzori et al., 2010)....
[...]
...The RFID tags’major features are auto identification and unique identity, which perform a rapid exchange of information between tags and readers through a wireless connection (Atzori et al., 2010)....
[...]
4,145 citations