2017 International Conference on IoT and Application (ICIOT) 2017
DOI: 10.1109/iciota.2017.8073640
|View full text |Cite
|
Sign up to set email alerts
|

Review on security and privacy concerns in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Smart campuses are subject to a variety of security threats and attacks, from external ones like DDoS and phishing attacks to internal ones like employee or student negligence or malicious acts. Here are a few of the most prevalent security threats that smart campuses must deal with: -Attacks through DDoS: As illustrated in Figure 6 DDoS attacks aim to disrupt normal network operation by overloading servers with malicious traffic coming from several computers [36].…”
Section: Attack Scenario In Smart Campusmentioning
confidence: 99%
“…Smart campuses are subject to a variety of security threats and attacks, from external ones like DDoS and phishing attacks to internal ones like employee or student negligence or malicious acts. Here are a few of the most prevalent security threats that smart campuses must deal with: -Attacks through DDoS: As illustrated in Figure 6 DDoS attacks aim to disrupt normal network operation by overloading servers with malicious traffic coming from several computers [36].…”
Section: Attack Scenario In Smart Campusmentioning
confidence: 99%
“…A battery-based optimal communication environment has been similarly suggested as an optimal environment. The communication environment needs the least bat and most minor usage to convey a broadcast through the possibility of holding transmission-provided security [ 31 , 32 , 33 , 34 , 35 ].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers have already conducted classification of IoT attacks and various architectures have been proposed for authentication and access control [37], as well as to secure IoT communications [38]. Common IoT vulnerabilities and threats include distributed denial of service (DDOS) and attacks concerning integrity of data such as data modification attacks [39]. All modern IoT cryptographic models and security schemes are based on widely adopted privacy standards through encryption algorithms.…”
Section: Cloud Based Iot Data Privacy and Encryptionmentioning
confidence: 99%