2019
DOI: 10.1007/s11277-019-06405-y
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Security in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 48 publications
(35 citation statements)
references
References 44 publications
0
35
0
Order By: Relevance
“…In the work of Harbi et al, different attacks are identified in IoT, namely node injection and tempering, sinkhole, replay, and social engineering. There security requirements data, communication, and device level are emphasized.…”
Section: Methodsmentioning
confidence: 99%
“…In the work of Harbi et al, different attacks are identified in IoT, namely node injection and tempering, sinkhole, replay, and social engineering. There security requirements data, communication, and device level are emphasized.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, the prediction output can be processed and obtained instantaneously based on the continuously trained data. Arguably, there are potential drawbacks including ethical issues and personal data security through the IoT ( Harbi et al, 2019 , Summer, 2016 ); however, the potential benefit as a result of the proposed use of the IoT could be significant, thereby identifying and offering support for individuals who need such support most; furthermore, data could be encrypted to avoid any misuse. In this way, a combination of the internet, technology and big data can be used not only to advance the UN SDG 3, but also to support organisational sustainability and economic progress.…”
Section: Conclusion Limitations and Future Researchmentioning
confidence: 99%
“…Ciphers are generated in the time period [0, TS] for all valid Q. The hash h is estimated for a request R, which is given as in Equation (8).…”
Section: Step 2 the Contributing Hash At The Intermediate Gateways Imentioning
confidence: 99%
“…Decentralization being the common paradigm of both WSN and IoT, security measures and authentication process are administered in both nodes/device-level and network-level to improve the reliability of the network. 8 Blockchain 9 is distributed security technology that encompasses authentication, cryptographic function, peer-to-peer communication, storage, and access related features. With multiple beneficial features and decentralized and adaptable nature, blockchain is employed in various fields for providing security.…”
mentioning
confidence: 99%