2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) 2014
DOI: 10.1109/prisms.2014.6970594
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy in the Internet of Things: Current status and open issues

Abstract: The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
181
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 311 publications
(183 citation statements)
references
References 35 publications
0
181
0
2
Order By: Relevance
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…Proposed mechanism does not consider all effective parameters in IoT. Abomhara et al focused on three issues: privacy for humans, confidentiality of business processes and third-party dependability [14]. According to them, security is an organized framework consisting of concepts, beliefs, principles, policies, procedures, techniques, and measures required to protect individual system assets as well as the system as a whole against any deliberate or unintentional threat.…”
Section: La-based Approach For Iotmentioning
confidence: 99%
“…When the mobile node moves to the new location, the location leader informs the new RFProxy of the movement of the mobile node, with information on the previous RFProxy (2). The new RFProxy receives the service information associated with the mobile node from the previous RFProxy (3,4), and requests a re-binding to the service agents (6,8). Now, the service agents and the mobile node can communicate through the RFProxy (10).…”
Section: Communication Between the Mobile Node And Shmentioning
confidence: 99%
“…This is difficult to implement in mobile phones and resource-constrained embedded systems like wearable devices. From the end user's viewpoint, since the personal device information is stored in a central server, privacy violations and security issues [4,5] are possible.…”
Section: Introductionmentioning
confidence: 99%