2019
DOI: 10.1109/jiot.2019.2891103
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications and Protected Data for a Internet of Things Smart Toy Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 22 publications
0
13
0
Order By: Relevance
“…The efforts to standardize security solutions for the IoT ecosystem initially introduced in [52] focused on communication security solutions for IoT, and their standardization, but it also applications, data custody and services. Protecting information is crucial and specific security mechanisms must be designed and implemented [51]. Blockchain techniques have also been considered to build secure and reliable data sharing platform among multiple data providers, where IoT data is encrypted and then recorded on a distributed ledger [52].…”
Section: Related Workmentioning
confidence: 99%
“…The efforts to standardize security solutions for the IoT ecosystem initially introduced in [52] focused on communication security solutions for IoT, and their standardization, but it also applications, data custody and services. Protecting information is crucial and specific security mechanisms must be designed and implemented [51]. Blockchain techniques have also been considered to build secure and reliable data sharing platform among multiple data providers, where IoT data is encrypted and then recorded on a distributed ledger [52].…”
Section: Related Workmentioning
confidence: 99%
“…How efficiently the principle of data security and the industry standards enforce the security of SCTs cannot be adequately determined. The literature has provided various techniques to address security risks stemming from SCTs themselves (e.g., capturing data emitted by the SCT) as well as security risks enabling access to the collected data (e.g., because of a lack of encrypted communication, breaking into devices, gaining access to passwords) (Rivera et al 2019;Chaudron et al 2019). The European Commission also recently issued a "Cybersecurity Strategy for the Digital Decade" (EC 2020b).…”
Section: Data Securitymentioning
confidence: 99%
“…Their scheme is very much efficient, less network connection overhead, providing a defense mechanism for attacks like denial of service, tampering, exhaustion of resources etc. In [4], they have developed a peculiar security mechanism for the IoT system by finding out the major threats in every module of the system and they are minimizing them as well in the same phase. There will be many restrictions for smart toy's hardware so they have presented a specific encryption methodology that proved to provide secure solution for the sensitive IoT environment.…”
Section: Literature Surveymentioning
confidence: 99%