E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
… 3 studies security requirements and challenges for IoT implementations. In Section 4, security
threats plaguing the Internet of Things are surveyed in such a way that all these threats are …