2018 2nd International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac)i-Smac (IoT in Social, Mobile, 2018
DOI: 10.1109/i-smac.2018.8653708
|View full text |Cite
|
Sign up to set email alerts
|

Architecture, Enabling Technologies, Security and Privacy, and Applications of Internet of Things: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…• Data Pipeline Cluster(s) -nodes organised in cluster(s) with efficient mechanisms to allow the processing of high volumes of data in real-time, and with data retention policies for off-line analysis. Such clusters can be implemented with multiple Kafka broker nodes that enable stream processing in a scalable fashion and for different types of application/services [38]. • Human Machine Interface (HMI) -nodes with security dashboards for human monitoring.…”
Section: A Elegant Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…• Data Pipeline Cluster(s) -nodes organised in cluster(s) with efficient mechanisms to allow the processing of high volumes of data in real-time, and with data retention policies for off-line analysis. Such clusters can be implemented with multiple Kafka broker nodes that enable stream processing in a scalable fashion and for different types of application/services [38]. • Human Machine Interface (HMI) -nodes with security dashboards for human monitoring.…”
Section: A Elegant Architecturementioning
confidence: 99%
“…Data pipeline cluster(s) can rely on the distributed streaming capabilities of Kafka for different types of application/services [38]. It is employed in several domains, ranging from IoT security, data collection for automation, event processing in networks, among others.…”
Section: Scalable Pipelines For Securitymentioning
confidence: 99%
“…Some parameter must be defined such as integrity, confidentiality, authentication, data management and interoperability to attain secure and reliable communication. [73][74][75][76][77][78] In Internet of things Network, Software and Encryptions attacks are most common attack are now a days. due to absence of the security layer, the attackers gain more chance to hack the data (the ratio of these have been described in Figure 5, (see Figure 5) So.…”
Section: Absence Of Security Layermentioning
confidence: 99%
“…So, rest of threats are external. Some parameter or principles must be mandatory such as integrity [76], confidentiality [77], [78], authentication [79], data management [80] and interoperability [81] to achieve reliable and secure communication. The purpose of this section is to validate our idea that security and privacy layer are important part of it.…”
Section: Suggested Layers In Architecture Model Of Iotmentioning
confidence: 99%