Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Proceedings Article
A Review of Universal Design in Ambient Intelligence Environments
Aleksander Bai,Heidi Camilla Mork,Till Halbach,Kristin Skeide Fuglerud,Wolfgang Leister,Trenton Schulz +5 more
TL;DR: The findings show that the majority of related work needs stronger emphasis on aspects related to universal design in general; universalDesign in ambient intelligence; universaldesign in multimodal interactions; anduniversal design in security, privacy, and other ethical aspects of smart environments.
Book ChapterDOI
Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains
TL;DR: The Reputation Capital model and an algorithm to form agents groups in each IoT federated domain, on the basis of the reputation capital of each agent, to realize a competitive framework and it is shown that malicious actors always pay for services significantly more than honest devices.
Journal ArticleDOI
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces
TL;DR: This article presents a holistic approach to IoT smart spaces, the SemIoTic ecosystem, to facilitate application development, space management, and service provision to its inhabitants.
Proceedings ArticleDOI
Preprocessing and Framework for Unsupervised Anomaly Detection in IoT: Work on Progress
TL;DR: This study presents a global framework for anomaly detection in IoT and proposes a distributed preprocessing framework and unsupervised learning approach has been chosen to reduce dimensionality of IoT data traffic.
Game strategies for distributed denial of service defense in the Cloud of Things
TL;DR: A novel game theory model is proposed to describe the CoT attacker, who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given time period; and the defender,who expects to minimize false alarms.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.