Proceedings ArticleDOI
Study on security architecture in the Internet of Things
Lan Li
- Vol. 1, pp 374-377
TLDR
This paper tends to analyze the security requirements in different layers of the IOT, and hence establish a security architecture system for the Iot, expecting to offer a theoretical reference for the establishment of reliable security systems of information for theIOT in the future.Abstract:
The future Internet of Things as an intelligent collaboration of miniaturized sensors poses new challenges to security and end-user privacy, the security in the IOT is one of the core technologies that will influence the security and sustainable development of the IOT. Therefore, a well-defined security architecture and security system for the IOT will have great impact on the save application and sustainable development of the IOT. This paper tends to analyze the security requirements in different layers of the IOT, and hence establish a security architecture system for the IOT, expecting to offer a theoretical reference for the establishment of reliable security systems of information for the IOT in the future.read more
Citations
More filters
Journal ArticleDOI
A survey on trust management for Internet of Things
TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.
Journal ArticleDOI
Internet of Things in agriculture, recent advances and future challenges
TL;DR: A survey of recent IoT technologies, their current penetration in the agricultural sector, their potential value for future farmers and the challenges that IoT faces towards its propagation is presented.
Proceedings ArticleDOI
Internet of Things: Security vulnerabilities and challenges
TL;DR: This study explores the security aims and goals of IoT and then provides a new classification of different types of attacks and countermeasures on security and privacy and discusses future security directions and challenges that need to be addressed to improve security concerns over such networks and aid in the wider adoption of IoT by masses.
Journal ArticleDOI
A Critical Analysis on the Security Concerns of Internet of Things (IoT)
TL;DR: This paper analyzes the security issues and challenges and provides a well defined security architecture as a confidentiality of the user's privacy and security which could result in its wider adoption by masses.
Proceedings ArticleDOI
Security attacks in IoT: A survey
TL;DR: A state of the art survey about the various attacks on IoT have been presented and compared including their efficiency and damage level in IoT.
References
More filters
Journal ArticleDOI
The Internet of Things: A survey
TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI
Internet of things - new security and privacy challenges
TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Book ChapterDOI
An Overview of Privacy and Security Issues in the Internet of Things
TL;DR: The authors outline the current technological and technical trends and their impacts on the security, privacy, and governance of the Internet of Things and an overview of the vision of the European Commission is provided.
BookDOI
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems
TL;DR: The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems.
Proceedings ArticleDOI
Internet of things and privacy preserving technologies
TL;DR: What kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations in the world of internet of things are considered.