Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Book ChapterDOI
Delivering Multicast Content Through Secure D2D Communications in the Internet of Things
TL;DR: This paper proposes MtMS-sD2D (Machine-type Multicast Service with secure D2D), an architecture for the delivery of multicast traffic in an IoT scenario that takes advantage from D 2D communications made reliable by means of a security mechanism.
Proceedings ArticleDOI
DPLPLN: Detection and Prevention from Flooding Attack in IoT
TL;DR: The proposed scheme is identified the malicious actions of the attacker and the attacker stops malicious activities in the network and the performance of the proposed DPLPLN is better in terms of different performance metrics like overhead and throughput.
Proceedings ArticleDOI
Towards the Open Ontology for IoT Ecosystem’s Security
Igor Tomičić,Petra Grd +1 more
TL;DR: In order to enable easier and more secure development of IoT solutions, this paper presents first steps towards developing the open ontology for IoT ecosystem elements security, relating them with existing security concepts, primitives, threats, vulnerabilities and practices.
Proceedings ArticleDOI
Study on the multi-modal data preprocessing for knowledge-converged super brain
TL;DR: This research deals with fusing multi-modal data from the IoE networks to efficiently provide a set of highly relevant input data for further high-level data analytics such as machine learning.
Journal ArticleDOI
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT
TL;DR: Wang et al. as mentioned in this paper proposed Hieraledger, a commitment protocol for exposing malicious gateways in appendable-block blockchain constructions, which employs fail-stop signatures thwarting signature forging, cryptographic hash functions, and a novel Merkle appendable tree.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.