scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System

TL;DR: This paper case study a smart plug system of a known brand is case study by exploiting its communication protocols and successfully launching four attacks: 1) device scanning attack; 2) brute force attack; 3) spoofing attack; 4) firmware attack.
Journal ArticleDOI

Securing the Internet of Things in a Quantum World

TL;DR: The impacts of quantum computers on the security of the cryptographic schemes used today are demonstrated, and an overview of the recommendations for cryptographic schemes that can be secure under the attacks of both classical and quantum computers are given.
Journal ArticleDOI

Internet of things for remote elderly monitoring: a study from user-centered perspective

TL;DR: This paper studies the IoT-enabled systems tackling elderly monitoring to categorize the existing approaches from a new perspective and to introduce a hierarchical model for elderly-centered monitoring.
Journal ArticleDOI

On security challenges and open issues in Internet of Things

TL;DR: This paper aims to analyze security challenges resulted from the special characteristics of the IoT systems and the new features of the Internet of Things applications to help pave the road to better security solution design.
Journal ArticleDOI

Trust Management Techniques for the Internet of Things: A Survey

TL;DR: An extensive analysis of trust management techniques along with their pros and cons is presented in a different context to help researchers understand that how various systems fit together to bring preferred functionalities without examining different standards.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Related Papers (5)