2020
DOI: 10.1016/j.future.2018.04.027
|View full text |Cite
|
Sign up to set email alerts
|

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
122
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 306 publications
(127 citation statements)
references
References 68 publications
1
122
0
1
Order By: Relevance
“…In the early www.ijacsa.thesai.org 80s, the first example of the Internet of Things appeared as a Coca-Cola machine, which was located at Carnegie Melon University. This machine had the ability to count the number of drinks left, and measure whether they are cold enough or not [44]. During the period between 1980 to 1990, many companies in America and Europe focused on manufacturing radio frequency identification (RFID) tags.…”
Section: A History Of the Internet Of Thingsmentioning
confidence: 99%
“…In the early www.ijacsa.thesai.org 80s, the first example of the Internet of Things appeared as a Coca-Cola machine, which was located at Carnegie Melon University. This machine had the ability to count the number of drinks left, and measure whether they are cold enough or not [44]. During the period between 1980 to 1990, many companies in America and Europe focused on manufacturing radio frequency identification (RFID) tags.…”
Section: A History Of the Internet Of Thingsmentioning
confidence: 99%
“…Recently, academic research targeting the privacy and security for IoT environments has gained more momentum. The survey papers [23], [24], [25], [26], and [27] evaluate the possible threats to IoT systems according to the layers and the available countermeasures. The present paper focus on IoT security with a more methodical and formal tools beginning with the proposition of a standard IoT architecture suitable for security needs, then by conducting a security audit covering the whole environment and finally by the reputed EBIOS risk analysis.…”
Section: Internet Of Things Securitymentioning
confidence: 99%
“…The rapid increase in technology users, particularly personal computers and mobile devices has called for more robust network security systems [1]. This has raised many concerns regarding the potential vulnerabilities and threats that can disclose a user's or organisations sensitive data [2].…”
Section: Introductionmentioning
confidence: 99%