2018
DOI: 10.1109/tcss.2018.2878921
|View full text |Cite
|
Sign up to set email alerts
|

A 3-D Security Modeling Platform for Social IoT Environments

Abstract: This is a repository copy of A 3-D security modeling platform for social IoT environments.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…The industrial Internet of Things (IIoT) is introducing new research trends for industrial applications 1,2 . In the last few years, the utilization of IoT solutions is rapidly increasing in several sectors such as healthcare, smart manufacturing, smart cities, energy, transportation, and many others 3 .…”
Section: Introductionmentioning
confidence: 99%
“…The industrial Internet of Things (IIoT) is introducing new research trends for industrial applications 1,2 . In the last few years, the utilization of IoT solutions is rapidly increasing in several sectors such as healthcare, smart manufacturing, smart cities, energy, transportation, and many others 3 .…”
Section: Introductionmentioning
confidence: 99%
“…The author of this research looked at the viability of representing the S-IoT using BPMN. The author investigated the viability of utilizing BPMN to express the S-IoT in (Zhou et al, 2018). BPMN can capture the technical and social elements of the S-IoT environment due to the nature of business processes, which comprise both manual user actions and automatic service tasks.…”
Section: A Security In S-iotmentioning
confidence: 99%
“…BPMN can capture the technical and social elements of the S-IoT environment due to the nature of business processes, which comprise both manual user actions and automatic service tasks. Based on this, (Zhou et al, 2018) proposed modeling the security needs using the third dimension. Traditional 2-Dbased systems suffer from a complexity management problem.…”
Section: A Security In S-iotmentioning
confidence: 99%
“…The symmetric key used to encrypt data is encrypted by the ABE algorithm and is stored in the blockchain. Zhou et al [33] proposed a 3-D security modeling platform that considers the social and technical aspects. This model is used to capture the security requirements in the Social Internet of Things.…”
Section: Blockchain With Encryptionmentioning
confidence: 99%