2019 IEEE 5th World Forum on Internet of Things (WF-IoT) 2019
DOI: 10.1109/wf-iot.2019.8767229
|View full text |Cite
|
Sign up to set email alerts
|

SURE-H: A Secure IoT Enabled Smart Home System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…N coded sym is the number of symbols that are covered by the jamming signals, N total sym = N f rame N sym N coded sym is the total number of the transmitted symbols for data fields, and P r is given by (5).…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…N coded sym is the number of symbols that are covered by the jamming signals, N total sym = N f rame N sym N coded sym is the total number of the transmitted symbols for data fields, and P r is given by (5).…”
Section: Problem Formulationmentioning
confidence: 99%
“…T HE a development of the Internet of Things (IoT) has triggered research on secure and green communications [1]- [3]. On one hand, the communication in IoT usually involves with much sensitive information, such as patients' private record [4], confidential sensor data [5], and important financial messages [6], etc, which makes the security problem a growing concern [7], [8] and security solutions more important. On the other hand, IoT terminal devices are often lightweight and battery-enabled, which requires security solutions to be of low complexity and of high energy efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…With the technological development, the demand for smart things is drastically increased in daily-life. The IoT is one of the major components that provide a facility to interact with IoT-enabled devices [4]. The application of IoT has been widely implemented in every sector such as security systems [5], [6], industry [7], [8], agriculture [9]-[11], E-commerce [12], and medicine [13]- [15].…”
Section: Introductionmentioning
confidence: 99%
“…These can be controlled and accessed at any time remotely from any computer, smartphone, or tablet [3]. With the increasing amount of devices connected to the IoT, security and privacy problems are being noticed and more pronounced [4]. Since IoT devices are expected to make their data available to stakeholders, doing so in a managed manner has become the key problem [5].…”
Section: Introductionmentioning
confidence: 99%