2018
DOI: 10.1002/cpe.5014
|View full text |Cite
|
Sign up to set email alerts
|

An opportunistic resource management model to overcome resource‐constraint in the Internet of Things

Abstract: Experts believe that the Internet of Things (IoT) is a new revolution in technology and has brought many advantages for our society. However, there are serious challenges in terms of information security and privacy protection. Smart objects usually do not have malware detection due to resource limitations and their intrusion detection work on a particular network. Low computation power, low bandwidth, low battery, storage, and memory contribute to a resource-constrained effect on information security and priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…In addition, information is a competitive resource in many organisations, and information leakage has serious consequences for firms, such as reputational damage, loss of revenue, loss of intellectual property, a reduction in productivity and competitive advantage, costs arising, and, in the worst-case scenario, bankruptcy [4,5]. Information leakage refers to the accidental or deliberate transfer of information to an unauthorised person or persons within or outside an organisational boundary [6,7]. It is acknowledged that technology alone cannot ensure a secure environment for information assets; the human aspects of information security should also be taken into consideration [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, information is a competitive resource in many organisations, and information leakage has serious consequences for firms, such as reputational damage, loss of revenue, loss of intellectual property, a reduction in productivity and competitive advantage, costs arising, and, in the worst-case scenario, bankruptcy [4,5]. Information leakage refers to the accidental or deliberate transfer of information to an unauthorised person or persons within or outside an organisational boundary [6,7]. It is acknowledged that technology alone cannot ensure a secure environment for information assets; the human aspects of information security should also be taken into consideration [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…In another paper, the authors address the restriction of resources by applying an effective and efficient approach that allows the system to choose the best nodes, create the Fog, and manage resources . The authors adopt a multi‐criteria decision‐making model that can help the existing systems to select the best nodes to overcome resource constraints in the Fog.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…There has been effort to merge machine learning techniques with static and dynamic malware analysis techniques to automate malware analysis tasks . Unlike Windows, Linux, OSX, and Android malware, IoT malware detection appears to be a topic that is under‐studied, perhaps due to the diversity in such devices with varying computational capabilities and resource‐constrained effects (eg, sensors, 3D printers, smart TV, smart fridge, and intelligent roadside units). Azmoodeh et al proposed a method for crypto‐ransomware detection in IoT networks based on power consumption.…”
Section: Introductionmentioning
confidence: 99%