Journal ArticleDOI
Security, privacy and trust in Internet of Things
TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.About:
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.read more
Citations
More filters
Proceedings ArticleDOI
An Assessment of Blockchain Consensus Protocols for the Internet of Things
TL;DR: A cross section of blockchain consensus protocols have been assessed against a requirement framework, to establish each consensus protocols strengths and weaknesses with respect to their potential implementation in an Internet of Things blockchain environment.
Journal ArticleDOI
Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
TL;DR: This survey has outlined different kinds of DoS attacks in different layers of the hybrid layering model, and presented different defense mechanisms to protect/mitigate these attacks at different layers.
Proceedings ArticleDOI
ECC based self-certified key management scheme for mutual authentication in Internet of Things
A. P. Haripriya,K. Kulothungan +1 more
TL;DR: An Elliptic Curve Cryptography (ECC) based Self-Certified Key Management (SCKM) scheme for mutual authentication scheme relying on self-certified public key management of IoT systems is proposed.
Journal ArticleDOI
Leveraging blockchain for ensuring trust in IoT: A survey
TL;DR: In this paper , the authors present a comparative analysis between traditional and blockchain-based trust management techniques as proof of work to represent the significance of blockchain in ensuring trust among IoT devices.
Book ChapterDOI
Application of Machine Learning for Ransomware Detection in IoT Devices
Roseline Oluwaseun Ogundokun,Joseph Bamidele Awotunde,Sanjay Misra,Oluwakemi Christiana Abikoye,Oluwafemi Folarin +4 more
TL;DR: In this paper, a machine learning model was presented to detect ransomware attacks on IoT devices using the power consumption of all operating processes of all the operating processes in 500 ms internals of all IoT devices.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of Things (IoT): A vision, architectural elements, and future directions
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI
Wireless sensor network survey
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.