2011 Fifth International Conference on Genetic and Evolutionary Computing 2011
DOI: 10.1109/icgec.2011.77
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Secure Architecture for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(24 citation statements)
references
References 6 publications
0
22
0
Order By: Relevance
“…Aim is to have all items connected with the Internet for convenient identification and management [1].It is logically divided into perception layer, transport layer and application layer [2]. The perception layer senses, gathers information, and submits the collected information to the higher application layer for intelligent processing via Internet or other transmitted networks.…”
Section: Introductionmentioning
confidence: 99%
“…Aim is to have all items connected with the Internet for convenient identification and management [1].It is logically divided into perception layer, transport layer and application layer [2]. The perception layer senses, gathers information, and submits the collected information to the higher application layer for intelligent processing via Internet or other transmitted networks.…”
Section: Introductionmentioning
confidence: 99%
“…These capabilities permit IoT devices to interact in an intelligent way in certain situations. Although the popularity of smart technologies, intelligence in the IoT is only means of interaction between devices, while user and device interactions are achieved by usual input methods and graphical user interfaces [21].…”
Section: Essential Characteristics Of Iotmentioning
confidence: 99%
“…• Massive amount of data: There are billions of IoT devices which create a large amount of data which raises many issues including those related to security and privacy [21].…”
Section: Essential Characteristics Of Iotmentioning
confidence: 99%
“…Therefore, the IoT meets the requirements of MCS. () There are several challenges in making crowdsensing suitable for the IoT, such as (1) automated configuration of various devices, (2) resource limitations, and (3) security and privacy of data. Embedding security of such crowdsensed data in the IoT becomes more the challenging aspect because of its complex and heterogeneous environment.…”
Section: Introductionmentioning
confidence: 99%