2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) 2021
DOI: 10.1109/ispcc53510.2021.9609355
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements in Internet of Things: Challenges and Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…In [14], the authors describe how to conduct a selfidenti ication procedure to achieve secure autocon iguration of IoT devices entering the cloud. In [15], the authors analyze the security concerns associated with the collection of IoT data and highlight three threats: i) the process involves IoT devices; ii) data exchange between devices and other parties, such as users and clouds; iii) security concerns associated with the con iguration chosen by users on their devices.…”
Section: Related Workmentioning
confidence: 99%
“…In [14], the authors describe how to conduct a selfidenti ication procedure to achieve secure autocon iguration of IoT devices entering the cloud. In [15], the authors analyze the security concerns associated with the collection of IoT data and highlight three threats: i) the process involves IoT devices; ii) data exchange between devices and other parties, such as users and clouds; iii) security concerns associated with the con iguration chosen by users on their devices.…”
Section: Related Workmentioning
confidence: 99%