Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Journal ArticleDOI
Intertwining the internet of things and consumers' behaviour science: Future promises for businesses
TL;DR: In this paper, the authors measure the relationships among the elements that affect customers' willingness and decisions to use IoTs-based products, and two categories of motivational factors are individuated: extrinsic factors, such as entertainment and social interaction, and intrinsic factors such as information acquisition, privacy risk, and technology readiness level.
Journal ArticleDOI
Heterogeneous Online Learning for “Thing-Adaptive” Fog Computing in IoT
TL;DR: A “thing-adaptive” online saddle-point (TAOSP) scheme is developed, which automatically adjusts the stepsize to offer desirable task-specific learning rates, and it is established that without prior knowledge of the time-varying parameters, TAOSP simultaneously yields near-optimality and feasibility.
Journal ArticleDOI
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications
TL;DR: In this paper, the authors provide a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems.
Journal ArticleDOI
On the security aspects of Internet of Things: A systematic literature review
Evandro L. C. Macedo,Egberto A. R. de Oliveira,Fabio H. Silva,Rui R. Mello,Felipe M. G. França,Flavia C. Delicato,José Ferreira de Rezende,Luis F. M. de Moraes +7 more
TL;DR: The protocol adopted to perform the SLR is described and the state-of-the-art on the field is presented by describing the main techniques reported in the retrieved studies by the first study to compile information on a comprehensive set of security aspects in IoT.
Proceedings ArticleDOI
Blockchain based trust management mechanism for IoT
TL;DR: Results from performance evaluation demonstrate that the proposed secure trust management system provides security features including tamper-proof and attacks resiliency, reliability in addition to a low complexity for IoT scenarios and applications.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.