Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Journal ArticleDOI
No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments
Kunal Sankhe,Mauro Belgiovine,Fan Zhou,Luca Angioloni,Frank Restuccia,Salvatore D'Oro,Tommaso Melodia,Stratis Ioannidis,Kaushik R. Chowdhury +8 more
TL;DR: This paper presents ORACLE, a novel system based on convolutional neural networks to identify a unique radio from a large pool of devices by deep-learning the fine-grained hardware impairments imposed by radio circuitry on physical-layer I/Q samples, and proposes an impairment hopping spread spectrum (IHOP) technique that is resilient to spoofing attacks.
Journal ArticleDOI
A Survey on Privacy and Security of Internet of Things
TL;DR: A comprehensive discussion on the current state of the art of IoT, with particular focus on what have been done in the areas of privacy and security threats, attack surface, vulnerabilities and countermeasures and to propose a threat taxonomy is provided.
Proceedings ArticleDOI
Key Management Protocol with Implicit Certificates for IoT systems
TL;DR: This paper proposes a Key Management Protocol for mobile and industrial Internet of Things systems, targeting, at the same time, robust key negotiation, lightweight node authentication, fast re-keying, and efficient protection against replay attacks.
Book ChapterDOI
A Framework for Blockchain Based Secure Smart Green House Farming
TL;DR: This paper provides lightweight blockchain based architecture for smart greenhouse farms to provide security and privacy and presents a security framework that blends the blockchain technology with IoT devices to provide a secure communication platform in Smart Greenhouse farming.
Journal ArticleDOI
Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)
Mohammad Dahman Alshehri,Mohammad Dahman Alshehri,Farookh Khadeer Hussain,Omar Khadeer Hussain +3 more
TL;DR: This work proposes a methodology for scalable trust management solution in the IoT that addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust- based migration of IoT nodes from one cluster to another.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.