The Internet of Things 2010
DOI: 10.1007/978-1-4419-1674-7_38
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Privacy and Security Issues in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
119
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 261 publications
(136 citation statements)
references
References 7 publications
0
119
0
1
Order By: Relevance
“…A privacy-enhanced waveform design approach aided by artificial noise has been proposed to enhance the communication secrecy in a wireless environment with multipath reception [12]. Some security issues that may occur in a CPS have also been discussed [13,14].…”
Section: Related Workmentioning
confidence: 99%
“…A privacy-enhanced waveform design approach aided by artificial noise has been proposed to enhance the communication secrecy in a wireless environment with multipath reception [12]. Some security issues that may occur in a CPS have also been discussed [13,14].…”
Section: Related Workmentioning
confidence: 99%
“…While in many situations, it is important to be able to map information to a specific person, in a cyber-physical system this may only happen in an anonymized fashion. There is a lot of ongoing research tackling the different problems and issues arising with shared information and privacy in IoT and CPS [15][16][17].…”
Section: Privacymentioning
confidence: 99%
“…IoT has physical configurations, including various technical elements, such as a communication/network and data mining technologies, a service mash-up technology, a technical service API, and a user interface technology. Therefore, it may have a variety of security vulnerabilities or flaws, and there may be specialized component parts connected to each of the components [9,10].…”
Section: Iot Security Vulnerabilities and Attack Typesmentioning
confidence: 99%
“…23, and frequency analysis, were carried out for rank selection. A questionnaire on the IoT security vulnerabilities identified in [9] and [10] was developed for measuring such vulnerabilities, based on a 7-point Likert scale.…”
Section: Security Vulnerability Priorities In the Military Iotmentioning
confidence: 99%