Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Posted Content
DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms
Francesco Restuccia,Salvatore D'Oro,Amani Al-Shawabka,Mauro Belgiovine,Luca Angioloni,Stratis Ioannidis,Kaushik R. Chowdhury,Tommaso Melodia +7 more
TL;DR: DeepRadioID as discussed by the authors proposes DeepRadioID, a system to optimize the accuracy of deep-learning-based radio fingerprinting algorithms without retraining the underlying deep learning model, which achieves 27% improvement over the state of the art on a 100-device dataset.
Journal ArticleDOI
Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey
Nikolaos Mantas,Malamati Louta,Eirini Karapistoli,George T. Karetsos,Stylianos Kraounakis,Mohammad S. Obaidat +5 more
TL;DR: This study offers a comprehensive survey of representative cooperation enforcement schemes that exploit a reputation system, analyse their distinct features, identify and discuss critical challenges that should be efficiently addressed when designing such mechanisms, and suggest potential solutions.
Proceedings ArticleDOI
A Framework for Pairing Circular Economy and the Internet of Things
TL;DR: An open, circular-by-design IoT architecture is sketched, where "smart" IoT objects are integrated in the IoT ecosystem with proven key circularity-enabling properties to maximize IoT resource and data harvesting in a new breed of circular- by- design IoT ecosystems.
Proceedings ArticleDOI
A requirements framework for the design of smart city reference architectures
TL;DR: The goal of this paper is to define a set of requirements for the design of smart city reference architectures and conduct a literature review to find the requirements which should fulfill these reference architectures.
Journal ArticleDOI
A risk assessment methodology for the Internet of Things
TL;DR: A general-purpose methodology for assessing the risk is proposed to be applied to end-to-end systems, which takes into account both static and dynamic features/components of an IoT system in an objective manner, following the whole data life cycle.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.