2011
DOI: 10.1109/mnet.2011.5772059
|View full text |Cite
|
Sign up to set email alerts
|

Multimedia traffic security architecture for the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
88
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 254 publications
(88 citation statements)
references
References 9 publications
0
88
0
Order By: Relevance
“…This has led Grout (2012) to coin the term "[the] Real Internet of Things (RIoT)", reflecting the likely implications and realisations that will take place as the IoT begins to be widely adopted by the public. This notion is implicitly supported by other researchers in the field, who have written extensively about the significance of the challenges relating to trust and security in the IoT (Ukil, Sen and Koilakonda, 2011, Xiong, Zhou and Liu, 2011, Zhou and Chao, 2011. Perhaps put most simply and precisely by Roman, Najera and Lopez (2011), "Trust is essential to implement the IoT".…”
Section: Trust and Fraudmentioning
confidence: 99%
“…This has led Grout (2012) to coin the term "[the] Real Internet of Things (RIoT)", reflecting the likely implications and realisations that will take place as the IoT begins to be widely adopted by the public. This notion is implicitly supported by other researchers in the field, who have written extensively about the significance of the challenges relating to trust and security in the IoT (Ukil, Sen and Koilakonda, 2011, Xiong, Zhou and Liu, 2011, Zhou and Chao, 2011. Perhaps put most simply and precisely by Roman, Najera and Lopez (2011), "Trust is essential to implement the IoT".…”
Section: Trust and Fraudmentioning
confidence: 99%
“…In this case, the underlying NP may optimally perform sleeping or rate adaptation configurations for energy saving, but without disrupting the service performance on the SP side. Last but not least, although security aspects have not been particularly discussed in this article, it is certainly a vital issue to be addressed given the open virtual environment that allows resource sharing between different parties/applications [17]. It will be certainly our future research work to consider security and access control mechanisms on the NP side against illegitimate access of network resources and potential denial of service attacks from malicious entities.…”
Section: Summary and Future Research Directionsmentioning
confidence: 99%
“…Implementing security hardware and software solution for clouds in IoT at data centres will be useful for all types of services. In our suggested architecture various security categories have been considered based on the selected literature (Jara et al, 2010;Zhou et al, 2011). These categories include:…”
Section: Internet Of Things and Cloud Computingmentioning
confidence: 99%