2020
DOI: 10.1007/978-981-15-0751-9_130
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Internet of Things (IoT)-Enabled Systems: Problem and Prospects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Therefore, the protection of a user’s privacy is another challenge [ 154 , 160 ]. Furthermore, digital identity and identity management are two other important issues that must be taken care of concerning the dynamic nature and scale of the number of devices, applications, and associated services in a large-scale emotion recognition system [ 154 , 161 , 162 ]. The challenge also is to address the resource-constraint nature of the IoT devices e.g., battery capacity, processing speed, and memory capacity to capture, store and analyze effective human emotions [ 163 , 164 , 165 , 166 ].…”
Section: Current Trends and Future Directionsmentioning
confidence: 99%
“…Therefore, the protection of a user’s privacy is another challenge [ 154 , 160 ]. Furthermore, digital identity and identity management are two other important issues that must be taken care of concerning the dynamic nature and scale of the number of devices, applications, and associated services in a large-scale emotion recognition system [ 154 , 161 , 162 ]. The challenge also is to address the resource-constraint nature of the IoT devices e.g., battery capacity, processing speed, and memory capacity to capture, store and analyze effective human emotions [ 163 , 164 , 165 , 166 ].…”
Section: Current Trends and Future Directionsmentioning
confidence: 99%
“…For example, the difference between an IoT sensor and a smartphone that has a significant gap. Since the devices have various specifications, the application of security should differ by the device [4]- [10]. To cover the security vulnerabilities in IoT devices, it is necessary to continuously application of software updates, firmware updates, and security patches from the manufacture.…”
Section: Introductionmentioning
confidence: 99%