2022
DOI: 10.3390/s22062196
|View full text |Cite
|
Sign up to set email alerts
|

IoT Platforms and Security: An Analysis of the Leading Industrial/Commercial Solutions

Abstract: For simplifying and speeding up the development of the Internet of Things (IoT) ecosystem, there has been a proliferation of IoT platforms, built up according to different design principles, computing paradigms, technologies, and targets. This paper proposes a review of main examples populating the wide landscape of IoT platforms and their comparison based on the IoT-A reference architecture. In such a way, heterogeneous IoT platforms (both current and future) can be analyzed regardless of their low-level spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 28 publications
0
7
0
2
Order By: Relevance
“…IoT has made a huge leap in recent years where its integration to 5G has played the main role [42] and is researched for satellite connectivity [43]. However, major IoT devices studied recently [44] reveal that little attention has been given to security except IIoT systems. Satellite connectivity enables the integration of vulnerable IoT devices dispersed in a highly distributed geographic area [45].…”
Section: Satellite-user Equipment Communicationsmentioning
confidence: 99%
“…IoT has made a huge leap in recent years where its integration to 5G has played the main role [42] and is researched for satellite connectivity [43]. However, major IoT devices studied recently [44] reveal that little attention has been given to security except IIoT systems. Satellite connectivity enables the integration of vulnerable IoT devices dispersed in a highly distributed geographic area [45].…”
Section: Satellite-user Equipment Communicationsmentioning
confidence: 99%
“…Using cluster analysis and the similarity of the attribute behaviours, we use a non-interactive approach of differential privacy in this manuscript and publish the contingency tables or marginals of the metadata. However, this approach works well for highdimensional metadata with a broad domain [12]. In order to offer a different level of privacy protection The use of diverse health data is suggested with a non-interactive manner.…”
Section: Introductionmentioning
confidence: 99%
“…496 IoT has made a huge leap in recent years where its integration to 5G has played the main role [44] and is researched for satellite connectivity [45]. However, major IoT devices studied recently [46] reveal that little attention has been paid to security except IIoT systems. Satellite connectivity enables the integration of vulnerable IoT devices dispersed over a highly distributed geographic area [47].…”
mentioning
confidence: 99%