Fog for 5G and IoT 2017
DOI: 10.1002/9781119187202.ch11
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…In this section, we give a brief overview of the challenges that IoT drags in [17], [20], [33] and that are driving the increasing interest for Edge and Fog computing, as solutions to such difficulties [4].…”
Section: The Post-cloud Eramentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we give a brief overview of the challenges that IoT drags in [17], [20], [33] and that are driving the increasing interest for Edge and Fog computing, as solutions to such difficulties [4].…”
Section: The Post-cloud Eramentioning
confidence: 99%
“…Today, cybersecurity solutions aim at defending enterprises and consumers providing perimeter-based protection through firewalls, Intrusion Prevention Systems (IPSs), and Intrusion Detection Systems (IDSs). Unfortunately, this paradigm is no longer adequate to address the new security challenges that IoT brings in [31], [33].…”
Section: H Security and Privacymentioning
confidence: 99%
“…Furthermore, each IoT object can be used either to fulfill specific goals or produce and consume IoT services [29]. These IoT objects vary from limited sensing capability sensors such as wearable devices, consumer goods, complicated endpoints, and advanced systems [30].…”
Section: Introductionmentioning
confidence: 99%