scispace - formally typeset
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TLDR
In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
About
This article is published in Computer Networks.The article was published on 2015-01-15. It has received 1258 citations till now. The article focuses on the topics: Information privacy & Cloud computing security.

read more

Citations
More filters
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Journal ArticleDOI

Internet of Things in the 5G Era: Enablers, Architecture, and Business Models

TL;DR: The present paper analyzes in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects and illustrates the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem.
Journal ArticleDOI

Internet of Things security

TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
References
More filters
Proceedings ArticleDOI

A subjective model for trustworthiness evaluation in the social Internet of Things

TL;DR: A subjective model for the management of trustworthiness which builds upon the solutions proposed for P2P networks is defined and preliminary simulations show the benefits of the proposed model towards the isolation of almost any malicious node in the network.
Book ChapterDOI

Scheduling for shared window joins over data streams

TL;DR: This paper addresses the shared execution of windowed joins, a core operator for CQ systems, and proposes two new execution strategies for shared joins that provide the best performance over a range of workload settings.
Proceedings ArticleDOI

Challenges in middleware solutions for the internet of things

TL;DR: This paper surveys existing middleware designed for IoT and focuses on various technical challenges in this domain.
Proceedings ArticleDOI

A lightweight authentication protocol for Internet of Things

TL;DR: This paper proposes an encryption method based on XOR manipulation, instead of complex encryption such as using the hash function, for anti-counterfeiting and privacy protection, and enhances the security and hardware design methodology.
Proceedings ArticleDOI

Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT

TL;DR: This paper presents an in-depth performance evaluation of Attribute-Based Encryption, a public key encryption scheme that enables fine-grained access control, scalable key management and flexible data distribution, on different classes of mobile devices including a laptop and a smartphone.
Related Papers (5)