2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905270
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things: A study on security and privacy threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(18 citation statements)
references
References 16 publications
0
16
0
1
Order By: Relevance
“…Applying the Brahmagupta-Fibonacci identity from above, we get 4 2 + 6 2 + 6 2 + 9 2 = (9 − 4) 2 + (6 + 6) 2 = 5 2 + 12 2 = (9 + 4) 2 + (6 − 6) 2 = 13 2 + 0 2 = However, in this case, there are nine sums of four squares. (1,4,6,18), (1,6,12,14), (2,2,12,15), (2,6,9,16), (4,6,6,17), (4,6,10,15), (5,8,12,12), (6,6,7,16), (6,8,9,14) Only one of these is applicable to the Brahmagupta-Fibonacci identity, providing the two sum of two squares. A faster method, using a modified binary greatest common divisor, quickly validates a sum of four squares.…”
Section: Casementioning
confidence: 99%
See 1 more Smart Citation
“…Applying the Brahmagupta-Fibonacci identity from above, we get 4 2 + 6 2 + 6 2 + 9 2 = (9 − 4) 2 + (6 + 6) 2 = 5 2 + 12 2 = (9 + 4) 2 + (6 − 6) 2 = 13 2 + 0 2 = However, in this case, there are nine sums of four squares. (1,4,6,18), (1,6,12,14), (2,2,12,15), (2,6,9,16), (4,6,6,17), (4,6,10,15), (5,8,12,12), (6,6,7,16), (6,8,9,14) Only one of these is applicable to the Brahmagupta-Fibonacci identity, providing the two sum of two squares. A faster method, using a modified binary greatest common divisor, quickly validates a sum of four squares.…”
Section: Casementioning
confidence: 99%
“…The success of IoT-enabled technologies in the development of smart cities, smart homes and intelligent mobile-health systems depends on the robustness in IoT authentication and secure data transmission between the IoT nodes and servers [9,10]. The aim of IoT security solutions is to prevent the leakage of private information and harmful actuating activities.…”
Section: Introductionmentioning
confidence: 99%
“…Bu teknolojilerden bazılarında bulunan güvenlik açıkları [9] nedeniyle Nesnelerin İnternetinde uçtan uca güvenli haberleşme sağlanamamaktadır [10]. Uçtan uca güvenli haberleşmenin sağlanması için söz konusu güvenlik açıklarının tespit edilip önlemler alınması gerekmektedir [11].…”
Section: Nesnelerinunclassified
“…A replay assault is a class of network assault in which an assailant distinguishes an information transmission and falsely has it duplicated or delayed. The duplicate or delay of the information transmission is completed by the sender or by the malicious element, who catches the information and retransmits it [8].…”
Section: Replay Attackmentioning
confidence: 99%
“…The method of replacing the first tag with the new one and replicating unique label identifier to it [8]. The labels and programming are accessible in the market.…”
Section: Tag Cloningmentioning
confidence: 99%