scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Journal ArticleDOI

Internet of Things in the 5G Era: Enablers, Architecture, and Business Models

TL;DR: The present paper analyzes in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects and illustrates the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem.
Journal ArticleDOI

Internet of Things security

TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
References
More filters

FT-RC4: A Robust Security Mechanism for Data Stream Systems

TL;DR: This paper proposes a security architecture for data stream systems, then presents a new mechanism, FT-RC4, that provides data integrity and confidentiality, and demonstrates its practicality by implementing it inside the authors' prototype data stream system and evaluating its performance.
Journal ArticleDOI

A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources

TL;DR: A semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information to scale favorably on problems with up to hundreds of services and tens of service directories is introduced.
Journal ArticleDOI

A WSN-Oriented Key Agreement Protocol in Internet of Things

TL;DR: Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy, it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network.
Journal Article

A Hierarchical Trust Model for the Internet of Things

TL;DR: With simulations analyzing the impact of abnormal node ratio, node density, and tag communication range on the organization trust, the hierarchical trust model can effectively detect malicious organizations from their node behaviors and has demonstrated good convergence in the distributed IoT environment.
Proceedings Article

Architecting Information Centric ETSI-M2M systems

TL;DR: This work presents an Overlay Service Capability Layer, based on Information Centric Networking design, for seamless service provisioning across heterogeneous Machine-to-Machine (M2M) systems.
Related Papers (5)