2018
DOI: 10.1016/j.procs.2018.10.168
|View full text |Cite
|
Sign up to set email alerts
|

Towards Security on Internet of Things: Applications and Challenges in Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
32
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 77 publications
(32 citation statements)
references
References 45 publications
0
32
0
Order By: Relevance
“…In 2008, Nakamoto [26] conceived blockchain as a distributed digital ledger for Bitcoin transactions [3,5]. Since these modest conceptual beginnings, researchers and practitioners have added various features, and developed blockchain-based solutions for cross-organizational workflow management [14], supply chain records [17,25], security and privacy in the context of the Internet of Things [10,32], finance and assurance [21], social business [33], and governmental services, as for example in Estonia [24] and Dubai [1].…”
Section: Blockchainmentioning
confidence: 99%
“…In 2008, Nakamoto [26] conceived blockchain as a distributed digital ledger for Bitcoin transactions [3,5]. Since these modest conceptual beginnings, researchers and practitioners have added various features, and developed blockchain-based solutions for cross-organizational workflow management [14], supply chain records [17,25], security and privacy in the context of the Internet of Things [10,32], finance and assurance [21], social business [33], and governmental services, as for example in Estonia [24] and Dubai [1].…”
Section: Blockchainmentioning
confidence: 99%
“…In the IoT paradigm devices communicate with each other regardless of their owners. The communication is not only between machines to humans but also between machine to machine [ 1 ] and machine to smart objects [ 2 ]. The Internet of connected devices namely the Internet of things (IoT) includes different domains (shown in Figure 1 ) like healthcare, agriculture, smart city, smart home, smart grid, automated vehicles, assets monitoring, environmental monitoring, education, industries, and so on [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
“…Several researchers from universities, industries, businesses, and government institutions are currently exploring technology from three main perspectives, i.e. scientific theory, theoretical design, and user's experience [9]. This is very useful to empower the users by giving them education related to how to understand and control their environment through new knowledge that can be accessed interactively, commonly regarded as an application that is not traditional anymore [9].…”
Section: Introductionmentioning
confidence: 99%
“…scientific theory, theoretical design, and user's experience [9]. This is very useful to empower the users by giving them education related to how to understand and control their environment through new knowledge that can be accessed interactively, commonly regarded as an application that is not traditional anymore [9]. For this reason, a study related to the perspective of users of public services and the use of applications is important.…”
Section: Introductionmentioning
confidence: 99%