2019
DOI: 10.1016/j.comnet.2018.11.026
|View full text |Cite
|
Sign up to set email alerts
|

A survey on internet of things security from data perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(27 citation statements)
references
References 71 publications
0
27
0
Order By: Relevance
“…Flexible antennas made for wearable purposes need unique attributes such as limited visibility for the user, robust antenna performance in different conditions, mechanical stability, and withstanding rigor, such as washing and ironing [ 71 ]. Different types of substrates used in wearable antennas have been reported in a prior article [ 3 ]. Felt, fleece, silk, and Cardura, off-the-shelf (electro) textile materials, and standard apparel are a few examples of substrates that have been used for wearable/flexible antennas.…”
Section: Materials For Flexible Antennasmentioning
confidence: 99%
See 1 more Smart Citation
“…Flexible antennas made for wearable purposes need unique attributes such as limited visibility for the user, robust antenna performance in different conditions, mechanical stability, and withstanding rigor, such as washing and ironing [ 71 ]. Different types of substrates used in wearable antennas have been reported in a prior article [ 3 ]. Felt, fleece, silk, and Cardura, off-the-shelf (electro) textile materials, and standard apparel are a few examples of substrates that have been used for wearable/flexible antennas.…”
Section: Materials For Flexible Antennasmentioning
confidence: 99%
“…Every sector will benefit from 5G networks ranging from 3-D imaging, advanced health care, streaming services, and smart cities, to name a few [ 2 ]. Further, a strong 5G network is essential to the proper functioning of the Internet of Things (IoT) devices [ 3 , 4 ]. A visual representation of the interconnection between IoT things and the 5G network is shown in Figure 1 .…”
Section: Introductionmentioning
confidence: 99%
“…For this purpose, Kim et al [46] devised a mechanism by implementing proxy reencryption for transmitting data with minimal encryption overhead. Sahay et al [59] prevented the flow of malicious data in the system by devising a mechanism for detecting the malicious nodes which are vulnerable to version number attacks, whereas Hou et al [38] combined the concept of IoT architectures and data life cycles to devise a threedimensional approach for exploring IoT security. Singh et al [62] presented an overview of the blockchain technology and its implementation toward enhancing the security of IoT using blockchain, whereas Jeon et al [42] uses MySQL's Mobius configuration to devise a novel IoT server platform supported by a blockchain for secure storage and retrieval of sensor data.…”
Section: Related Workmentioning
confidence: 99%
“…The requirements for the large-scale deployment of IoT are rapidly increasing with major security concerns [5]. There are various communication standards for HAN including Bluetooth, IEEE 802.15.4 specifics the physical (PHY) and medium access control (MAC) layer standards of ZigBee and supports very low power consumption, making it a cost-effective technology [6].…”
Section: Introductionmentioning
confidence: 99%