scispace - formally typeset
Open AccessJournal ArticleDOI

Security and privacy issues of physical objects in the IoT: Challenges and opportunities

Reads0
Chats0
TLDR
Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized and possible directions for dealing with these challenges are pointed out.
About
This article is published in Digital Communications and Networks.The article was published on 2021-08-01 and is currently open access. It has received 45 citations till now. The article focuses on the topics: Enterprise information security architecture & Ubiquitous computing.

read more

Citations
More filters
Journal ArticleDOI

Efficient Algorithms for E-Healthcare to Solve Multiobject Fuse Detection Problem

TL;DR: Modifications to improve the efficiency of the improved K-nearest neighbor (MK-NN) algorithm for electronic medical care are introduced and a comparative analysis was performed to determine the best fuse target detection algorithm based on robustness, accuracy, and computational time.
Journal ArticleDOI

A Comprehensive Review of Internet of Things: Technology Stack, Middlewares, and Fog/Edge Computing Interface

TL;DR: A comprehensive review of the enabling technologies and standards that build up the IoT technology stack, the associated middleware and networks required to build future proof applications (the vertical markets) is provided.
Journal ArticleDOI

Host-based IDS: A review and open issues of an anomaly detection system in IoT

TL;DR: In this paper , the authors address an overview of cybersecurity threats in IoT, important recommendations for a real-time IDS, and a realtime dataset setting to evaluate a security system covering multiple cyber threats.
Journal ArticleDOI

Data anonymization evaluation for big data and IoT environment

TL;DR: In this paper , the authors proposed a data anonymization evaluation framework that can evaluate commonly used data anonymisation algorithms in terms of privacy preserving level, data utility, and performance, which can help to prevent inappropriate usage of anonymized data.
References
More filters
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Proceedings ArticleDOI

Physical unclonable functions for device authentication and secret key generation

TL;DR: This work presents PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describes how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographic operations.
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Related Papers (5)