Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Journal ArticleDOI
An access control for IoT based on network community perception and social trust against Sybil attacks
Gustavo H. C. de Oliveira,Agnaldo Batista,Michele Nogueira,Michele Nogueira,Aldri Santos,Aldri Santos +5 more
TL;DR: In this article, the authors introduce the ELECTRON mechanism to control access in IoT networks based on social trust between devices to protect the network from Sybil attackers, which can compromise data privacy or disrupt the network operation.
Journal ArticleDOI
IoT-Orchestration based nanogrid energy management system and optimal time-aware scheduling for efficient energy usage in nanogrid
TL;DR: In this article , a task orchestration architecture for efficient energy management of a nanogrid system that focuses on minimizing the use of non-renewable energy resources and maximizing the utilization of renewable energy resources is presented.
Proceedings ArticleDOI
Cloud-SPHERE: A Security Approach for Connected Unmanned Aerial Vehicles
TL;DR: This paper presents Cloud-SPHERE, a security approach for unmanned vehicles to communicate and provide services securely, targeting their integration into the IoT ecosystem.
Journal ArticleDOI
Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization
TL;DR: The security of the network layer in IoT is getting more attention in recent decades with the advent of the Internet of Things.
Journal ArticleDOI
Long-term secure management of large scale Internet of Things applications
TL;DR: Experimental and simulation evaluations show that the proposed protocols/mechanisms along with a variant of Broadcast Enc encryption called Secure Identity-Based Broadcast Encryption (SIBBE) outperforms the existing schemes in terms of scalability, latency, and communication overhead.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.