2018
DOI: 10.1109/mcom.2018.1701204
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…This becomes truly serious in areas such as banks, healthcare, and, without doubt, IPV survivor safety. Some authors, such as Yu et al [63], insist on the importance of this idea in ICT and especially IoT-based structures, which can easily be exposed to a distributed denial of service (DDoS) attack. Chiang and Zang [64] suggest some future strategies to strengthen IoT communications: keeping security credentials and software up to date, protecting resource-constrained devices, assessing the security status of a large distributed system in a trustworthy manner, and responding to security compromises without causing intolerable disruptions.…”
Section: Ethics: Security and Privacy Dilemmasmentioning
confidence: 99%
“…This becomes truly serious in areas such as banks, healthcare, and, without doubt, IPV survivor safety. Some authors, such as Yu et al [63], insist on the importance of this idea in ICT and especially IoT-based structures, which can easily be exposed to a distributed denial of service (DDoS) attack. Chiang and Zang [64] suggest some future strategies to strengthen IoT communications: keeping security credentials and software up to date, protecting resource-constrained devices, assessing the security status of a large distributed system in a trustworthy manner, and responding to security compromises without causing intolerable disruptions.…”
Section: Ethics: Security and Privacy Dilemmasmentioning
confidence: 99%
“…Beside the aforementioned areas, several works proposed security solutions specially designed for the IoT or D2D context with regard to confidentiality, data reliability, privacy, access control, and authentication, which are mostly surveyed in previous studies. [22][23][24][25][26][27][28][29][30][31] More related to our paper, some other survey papers review existing works focusing especially on trust models in the IoT 6,9,10,[32][33][34] or D2D 11,35,36 context. In the following, we review these works, regardless of whether they use or not social-related information.…”
Section: Related Workmentioning
confidence: 99%
“…This summary indicates the need to protect IoT systems and resources from potential threats and attacks not only in internal networks but also originating from networks that span multiple jurisdictions. With the sensitive nature of the IoT and its dynamic characteristics, many of these issues cannot be addressed with a simple software patch or commonly used security measures [ 23 , 24 , 25 ]. Security solutions for the IoT need to be designed for their intended context, the IoT.…”
Section: Introductionmentioning
confidence: 99%