2023
DOI: 10.1007/s43926-023-00046-1
|View full text |Cite
|
Sign up to set email alerts
|

Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces

Christoph Lipps,
Jan Herbst,
Steffen Klingel
et al.

Abstract: What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both require… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
0
0
Order By: Relevance
“…The physical layer security is regarded as the first line of defense for Industrial Internet of Things security [13,14]. This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers.…”
Section: Introductionmentioning
confidence: 99%
“…The physical layer security is regarded as the first line of defense for Industrial Internet of Things security [13,14]. This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers.…”
Section: Introductionmentioning
confidence: 99%
“…The physical layer security is regarded as the first line of defense for industrial Internet security [14,15].This is because physical layer security involves the security of infrastructure such as network devices, sensors, and controllers. These infrastructure are the foundation of industrial Internet operations, and once they are threatened or attacked, it may have a serious impact on the entire network [16,17].…”
Section: Introductionmentioning
confidence: 99%