AH Ahmed, NM Omar, HM Ibrahim - … ICT: Big Data, Cloud Security, 2017 - researchgate.net
… protocol stacks and security techniques. The need for … either to IoT applications or architectures to maintain and secure largescale … IoTarchitectures and a fair discussion to their security …
… of current challenges facing IoTsecuritysolutions, such as the lack of … IoT devices. We also explore the application of novel techniques to secureIoT, such as the use of Blockchain in IoT …
… Within our SLR, we want to include architectures for IoTsecurity or architectures that were specifically designed with IoTsecurity concerns in mind. When architectures are not …
… architectures we propose a security model for the IoT. Firstly, the proposed security model was designed to establish and secure … Secondly, we extended the proposed architecture in …
… sent to publish/subscribe architecture that discover interesting relationships and data flows. The FIWARE IoTarchitecture consists of an IoT services enablement chapter that manages …
… Hence, each layer requires security protocols to accomplish a secured IoT … IoT, its various architectures, security conventions, technological, and security challenges in IoTarchitectures. …
… This paper provides a comprehensive study on IoTsecurity issues, … securitysolutions for each challenge in a three-layer architectural way, and finally in Section 5 we discuss IoT …
J Zhang, H Jin, L Gong, J Cao… - 2019 IEEE Fourth …, 2019 - ieeexplore.ieee.org
… , services can be provisioned using centralized architectures, where … security and privacy challenges. The purpose of this paper is to show that IoT three-layer security logic architecture …
… We discuss IoT system architectures with different layers and the associated security issues … we summarize the security issues through the overall architecture of an IoT system. Several …