2023
DOI: 10.11591/ijeecs.v32.i2.pp900-914
|View full text |Cite
|
Sign up to set email alerts
|

Towards secure smart campus: security requirements, attacks and counter measures

Ahmed Srhir,
Tomader Mazri,
Mohammed Benbrahim

Abstract: <span>The internet of things (IoT) has the potential to significantly impact growth due to the technological revolution, widespread dissemination of information, and emergence of events. Intelligent housing, urban centers, and educational systems are all forms of intelligence. The IoT gs has garnered significant attention from researchers, who claim that this technology will play a pivotal role in determining the future of the Internet, as per the reports of Cisco Inc., in this context, the concept of a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…The surge in IoT device numbers has led to heightened security and privacy challenges, including threats like man-in-the-middle attacks and data breaches. Authentication of connected devices is essential, addressing privacy concerns by ensuring data confidentiality and privacy within the network [22]. It plays a critical role in communication security by verifying the legitimacy of data sources, confirming the accuracy and authorization of information exchanged between network nodes.…”
Section: Overview Of Authentication In Wsnmentioning
confidence: 99%
“…The surge in IoT device numbers has led to heightened security and privacy challenges, including threats like man-in-the-middle attacks and data breaches. Authentication of connected devices is essential, addressing privacy concerns by ensuring data confidentiality and privacy within the network [22]. It plays a critical role in communication security by verifying the legitimacy of data sources, confirming the accuracy and authorization of information exchanged between network nodes.…”
Section: Overview Of Authentication In Wsnmentioning
confidence: 99%