… an overview of Internet of Things architecture and interconnected networks’ interoperability. We also illustrate a systematic analysis of the critical securityproblems and mitigation …
GS Matharu, P Upadhyay… - … conference on emerging …, 2014 - ieeexplore.ieee.org
… This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. … of the IoT architecture, by tackling securityissues at each layer of the architecture. The paper …
… security of IoT technology. However, our study reveals some securitychallenges and issues … Consequently, the focus of this review paper is to categorize the security tasks and topics …
Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… of challenges. This paper focuses on the securityproblems among all other challenges. As IoT is built on the basis of the Internet, securityproblems of the Internet will also show up in …
FA Alaba, M Othman, IAT Hashem, F Alotaibi - Journal of Network and …, 2017 - Elsevier
… This study also compares possible securitythreats in the IoT. We discuss the IoT security … We present an IoT security taxonomy based on the current securitythreats in the contexts of …
K Zhao, L Ge - … on computational intelligence and security, 2013 - ieeexplore.ieee.org
… Beginning with introducing the architecture and features of IoT security, this paper expounds several securityissues of IoT that exist in the three-layer system structure, and comes up …
… to various securitythreats in our daily life. The majority of the securitythreats are related to leakage of information and loss of services. In IoT, the securitythreats straightforwardly are …
Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
… security mechanisms in conventional Internet protocols need to be modified or extended to support the IoT applications. In this section, we discuss the securityproblems … InternetThings J…
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
… security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges … We conclude our paper discussing various research challenges that still exist in …