scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Proceedings Article

A Review of Universal Design in Ambient Intelligence Environments

TL;DR: The findings show that the majority of related work needs stronger emphasis on aspects related to universal design in general; universalDesign in ambient intelligence; universaldesign in multimodal interactions; anduniversal design in security, privacy, and other ethical aspects of smart environments.
Book ChapterDOI

Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains

TL;DR: The Reputation Capital model and an algorithm to form agents groups in each IoT federated domain, on the basis of the reputation capital of each agent, to realize a competitive framework and it is shown that malicious actors always pay for services significantly more than honest devices.
Journal ArticleDOI

The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces

TL;DR: This article presents a holistic approach to IoT smart spaces, the SemIoTic ecosystem, to facilitate application development, space management, and service provision to its inhabitants.
Proceedings ArticleDOI

Preprocessing and Framework for Unsupervised Anomaly Detection in IoT: Work on Progress

TL;DR: This study presents a global framework for anomaly detection in IoT and proposes a distributed preprocessing framework and unsupervised learning approach has been chosen to reduce dimensionality of IoT data traffic.

Game strategies for distributed denial of service defense in the Cloud of Things

TL;DR: A novel game theory model is proposed to describe the CoT attacker, who expects to use minimum set and energy consumption of IoT attack devices to occupy as many bandwidth resources as possible in a given time period; and the defender,who expects to minimize false alarms.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Related Papers (5)