scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Journal ArticleDOI

Internet of Things in the 5G Era: Enablers, Architecture, and Business Models

TL;DR: The present paper analyzes in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects and illustrates the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem.
Journal ArticleDOI

Internet of Things security

TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
References
More filters
Proceedings Article

CADS: continuous authentication on data streams

TL;DR: CADS is proposed, which minimizes the processing and transmission overhead through an elaborate indexing scheme and a virtual caching mechanism and is extended to the case where multiple owners outsource their data to the same SP.
Proceedings ArticleDOI

Enforcing access control over data streams

TL;DR: This paper designs a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified access control policies.
Journal ArticleDOI

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things

TL;DR: ePASS is described, a novel ABS scheme that uses an attribute tree and expresses any policy consisting of AND, OR threshold gates under the computational Diffie-Hellman problem, and delivers enhanced performance by reducing the computational cost and signature size.
Journal ArticleDOI

Security Frameworks for Wireless Sensor Networks-Review

TL;DR: This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.
Related Papers (5)