2015
DOI: 10.1007/978-3-662-45402-2_97
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues on Smarthome in IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(22 citation statements)
references
References 0 publications
0
21
0
Order By: Relevance
“…Therefore, a light weight encryption algorithm [94] and key management protocol are needed for IoT devices. Additionally, there are some DDoS-preventing algorithms [95], which use null routing or unauthorized packet filtering. However, these solutions cannot defend the reduced throughput because the router must receive the DDoS packet and filter it.…”
Section: Data Securitymentioning
confidence: 99%
“…Therefore, a light weight encryption algorithm [94] and key management protocol are needed for IoT devices. Additionally, there are some DDoS-preventing algorithms [95], which use null routing or unauthorized packet filtering. However, these solutions cannot defend the reduced throughput because the router must receive the DDoS packet and filter it.…”
Section: Data Securitymentioning
confidence: 99%
“…A message generated in the mobile node is transmitted to the ePost-it agent of the source SH (1, 2). Then, the ePost-it agent obtains the target SH information using a lookup engine (3,4), and transmits the message to the messaging agent in the target-SH managing destination (5). The message stored in the message buffer (6) is transferred through the push agent (7)(8)(9)(10).…”
Section: Structure Of Epost-it Middlewarementioning
confidence: 99%
“…This is difficult to implement in mobile phones and resource-constrained embedded systems like wearable devices. From the end user's viewpoint, since the personal device information is stored in a central server, privacy violations and security issues [4,5] are possible.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, with advanced sensor technologies they constitute in-home and self-learning care solutions to take some of the worry of family members off by helping in constantly monitoring the inhabitants. Although they provide many benefits, security related concerns arise if their services are not designed without considering information security (Yoon, Park and Yoo, 2015;Han, Jeon and Kim, 2015). Because, smart homes can be remotely controlled via smart phones, tablets or personal computers; since, they are typically connected to the Internet.…”
Section: Related Workmentioning
confidence: 99%