Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Journal ArticleDOI
State-of-the-art survey of artificial intelligent techniques for IoT security
TL;DR: In this paper , a taxonomy of IoT vulnerabilities, corresponding attackers, and effects, threats that explore weak links, effective remedies, and organizational authentication technologies that are currently available to recognize and track such deficiencies.
Journal ArticleDOI
Mobile Cloud Business Process Management System for the Internet of Things: A Survey
TL;DR: In this article, the authors analyse existing BPMS for IoT and identify the limitations and their drawbacks based on Mobile Cloud Computing perspective and discuss a number of open challenges in BPMS.
Journal ArticleDOI
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem
Konstantinos Rantos,George Drosatos,Antonios Kritsas,Christos Ilioudis,Alexandros Papanikolaou,Adam P. Filippidis +5 more
TL;DR: The paper provides a prototype implementation of the proposed ADVOCATE platform, a user-centric solution that allows data subjects to easily manage consents regarding access to their personal data in the IoT ecosystem and assists data controllers to meet GDPR requirements.
Journal ArticleDOI
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
TL;DR: The possibility of benefiting from machine learning algorithms by reducing the security costs of wireless sensor networks in several domains is discussed, in addition to the challenges and proposed solutions to improving the ability of sensors to identify threats, attacks, risks, and malicious nodes through their ability to learn and self-development using machineLearning algorithms.
Journal ArticleDOI
Universal and secure object ownership transfer protocol for the Internet of Things
TL;DR: A novel ownership transfer mechanism that securely transfers an RFID tagged objects in Internet of Things (IoT) in a secure manner and requires less computation as compared to existing similar protocols is proposed.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.