2013
DOI: 10.1109/mc.2013.74
|View full text |Cite
|
Sign up to set email alerts
|

Cyberentity Security in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
70
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 192 publications
(76 citation statements)
references
References 7 publications
1
70
0
Order By: Relevance
“…However, in order to achieve this, risk analyses that fuel an understanding of both technical, as well as, human aspects, need to be applied to help define and motivate the security requirements of IoTconnected homes. Ning et al [28] offer an IoT system architecture set to handle a broad array of challenges for enabling security, both at system, network, and application layer. Based on defining security in terms of requirements, such as, confidentiality, integrity, and availability, they conclude that research efforts need to be put into advanced cryptographic protocols, data management solutions, and strategies to manage the tradeoff between security, privacy, and utility of IoT systems.…”
Section: Security-based Approachesmentioning
confidence: 99%
“…However, in order to achieve this, risk analyses that fuel an understanding of both technical, as well as, human aspects, need to be applied to help define and motivate the security requirements of IoTconnected homes. Ning et al [28] offer an IoT system architecture set to handle a broad array of challenges for enabling security, both at system, network, and application layer. Based on defining security in terms of requirements, such as, confidentiality, integrity, and availability, they conclude that research efforts need to be put into advanced cryptographic protocols, data management solutions, and strategies to manage the tradeoff between security, privacy, and utility of IoT systems.…”
Section: Security-based Approachesmentioning
confidence: 99%
“…IoT must have a security chain in the connections and in the privacy of the assets, which can be solved if it has security policies, restart mechanisms, secure software, and bug reporting systems, as well as methods to discover and reshape vulnerabilities [16,17]. The four main IoT connectivity models are (i) device-to-device, (ii) device to the cloud, (iii) device to gateway, and (iv) data exchange through back-end.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In relation to the above mentioned, the definition of IoT is understood as to include all devices and objects whose state can be altered via the Internet, with or without the active involvement of humans. Different forecasts predict that there will be around 26 billion connected devices in the world by the year 2020 [16,17]. The potential economic benefits and the possibilities IoT brings should be clear, not least as processes will become autonomous or require very little human interaction.…”
Section: Introductionmentioning
confidence: 99%