Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems
Citations
440 citations
Cites background from "Securing the Internet of Things: A ..."
...For that reason, another huge part of the research is focused on the issue of securing the IoT domain [12]–[15]....
[...]
337 citations
Cites background from "Securing the Internet of Things: A ..."
...Attacks based on access level are active and passive attacks [38]–[40]....
[...]
86 citations
86 citations
Cites background from "Securing the Internet of Things: A ..."
...Requirements [152] [151] [148] [149] [147] [154] [145] [155] [156] [168] [169] [153] [143] [158] [157] [140] [160] [170]...
[...]
...[157], and Park and Shin [158] listed IoT security requirements that include data integrity, information protection, anonymity, non-repudiation and data freshness (i....
[...]
47 citations
References
12,539 citations
"Securing the Internet of Things: A ..." refers background in this paper
...The Internet of Things (IoT) [1] represents a global information network of our everyday devices, such as appliances and automotive, and provides an intelligent framework with...
[...]
2,529 citations
"Securing the Internet of Things: A ..." refers background in this paper
...The widespread mechanisms for restricting access to authorized users are as follows: Role-based Access Control (RBAC) [21] and Capability-based Access Control (CapBAC) [16, 22– 28]....
[...]
...However, RBACs are widely used for human-to-things communication, but they are not suitable for things-to-things communication....
[...]
...The widespread mechanisms for restricting access to authorized users are as follows: Role-based Access Control (RBAC) [21] and Capability-based Access Control (CapBAC) [16, 22–...
[...]
2,412 citations
"Securing the Internet of Things: A ..." refers methods in this paper
...The Constrained application protocol (CoAP) [13], a new proposed standard for the IoT, runs over UDP and implements the Datagram Transport Layer Security (DTLS) to achieve end to end security....
[...]
689 citations
"Securing the Internet of Things: A ..." refers background in this paper
...2: Comparison between Web stack and IoT stack [5]....
[...]
569 citations
"Securing the Internet of Things: A ..." refers methods in this paper
...[19] used a 6LoWPAN header-compression technique to reduce the size of the DTLS headers [20]....
[...]