2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) 2017
DOI: 10.1109/wits.2017.7934655
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…There have been several works that discussed IoT security and examined threats and attacks therein [ 34 , 37 , 104 , 105 , 106 , 107 , 108 ]. Many works, e.g., [ 32 , 44 , 109 , 110 , 111 , 112 , 113 , 114 ], categorize potential threats and attacks based on the different layers of an IoT architecture. Some of them (e.g., [ 30 , 115 ]) derive threats and attacks based on particular security issues e.g., identity, access control, trust, middleware and mobility.…”
Section: Threats and Attacksmentioning
confidence: 99%
“…There have been several works that discussed IoT security and examined threats and attacks therein [ 34 , 37 , 104 , 105 , 106 , 107 , 108 ]. Many works, e.g., [ 32 , 44 , 109 , 110 , 111 , 112 , 113 , 114 ], categorize potential threats and attacks based on the different layers of an IoT architecture. Some of them (e.g., [ 30 , 115 ]) derive threats and attacks based on particular security issues e.g., identity, access control, trust, middleware and mobility.…”
Section: Threats and Attacksmentioning
confidence: 99%
“…This is a protocol where authentication is performed by a challenge and if the challenge is completed successfully the permission is granted to access the tag else permission is declined. This is effective in case of low power devices because other authentication mechanisms cannot be used for small power [17]. b) Malicious Insider People inside the organization are considered as the weakest links of the chain when it comes to security.…”
Section: Randomized Watermarking Filtering Scheme (Rwfs) For Iot Is Amentioning
confidence: 99%
“…Until now, some authors tried to tackle the IoT security weak points by investigating in hardware solutions [29,30], while others suggested to solve the problem pinpointing to higher IoT layers, proposing innovative authentication methods included in MQTT, NFC [31], and smart card [32]. Above all, traditional defense mechanisms such as intrusion detection systems (IDSs) have been analyzed to further protect IoT devices.…”
Section: Related Workmentioning
confidence: 99%