2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet) 2018
DOI: 10.1109/roedunet.2018.8514146
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of IoT Security Threats and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…One unique aspect of CryptID is the use of structured public keys that can contain arbitrary metadata, allowing for a wide range of domain-specific use cases. In [80], a comprehensive review of recent malware and security threats related to IoT systems is provided. This review proposes a solution that allows secure applications to run on IoT devices in a secure execution framework by using verified bytecode in an isolated environment.…”
Section: Secure Executionmentioning
confidence: 99%
“…One unique aspect of CryptID is the use of structured public keys that can contain arbitrary metadata, allowing for a wide range of domain-specific use cases. In [80], a comprehensive review of recent malware and security threats related to IoT systems is provided. This review proposes a solution that allows secure applications to run on IoT devices in a secure execution framework by using verified bytecode in an isolated environment.…”
Section: Secure Executionmentioning
confidence: 99%
“…In recent years, many works have been published in the security analysis of IoT devices. Radovici et al (2018) identified the security issues regarding secure IoT software execution and proposed a secure code execution framework. Also, Gurunath et al (2018) described significant security problems of IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Beside the aforementioned areas, several works proposed security solutions specially designed for the IoT or D2D context with regard to confidentiality, data reliability, privacy, access control, and authentication, which are mostly surveyed in previous studies. [22][23][24][25][26][27][28][29][30][31] More related to our paper, some other survey papers review existing works focusing especially on trust models in the IoT 6,9,10,[32][33][34] or D2D 11,35,36 context. In the following, we review these works, regardless of whether they use or not social-related information.…”
Section: Related Workmentioning
confidence: 99%