scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Blockchain Technology: Evolution, Architecture and Security

TL;DR: A comprehensive survey of blockchain technology's evolution, architecture, development frameworks, and security issues is presented in this paper, where the authors present a comparative analysis of frameworks, classification of consensus algorithms, and analysis of security risks & cryptographic primitives that have been used in the blockchain.
Journal ArticleDOI

Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions:

TL;DR: A brief review of the trust models that have the potential to be implemented in Social Internet of vehicles and an overview of how trending concepts and emerging technologies like blockchain and fog computing can assist in developing a trust-based social Internet of Vehicles model for high-efficiency, decentralized architecture and dynamic nature of vehicular networks.
Journal ArticleDOI

Trust-based recommendation systems in Internet of Things: a systematic literature review

TL;DR: This paper presents a systematic literature review (SLR) of trust based IoT recommendation techniques so far and detailed classifications based on extracted parameters as well as investigation existing techniques in three different IoT layers put forth.
Journal ArticleDOI

The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model

TL;DR: An IoT ecosystem, IoT architecture, and the IoT service business model essential for the selection and deployment of IoT services in various enterprise settings are presented and how the IoT services can be developed to innovate hotel rooms are illustrated.
Journal ArticleDOI

A Comprehensive Study on the Trust Management Techniques in the Internet of Things

TL;DR: This article reviews the available trust management techniques in the IoT in a systematic way, including recommendation-based, prediction- based, policy-Based, and reputation-based techniques, which are compared based on some trust metrics such as accuracy, adaptability, availability, heterogeneity, integrity, privacy, reliability, and scalability.
References
More filters
Journal ArticleDOI

A survey on sensor networks

TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Wireless sensor network survey

TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Related Papers (5)