An end-to-end view of IoT security and privacy

Z Ling, K Liu, Y Xu, Y Jin, X Fu - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
In this paper, we present an end-to-end view of IoT security and privacy and a case study.
Our contribution is twofold. First, we present our end-to-end view of an IoT system and this …

Security and privacy for IoT and fog computing paradigm

A Rauf, RA Shaikh, A Shah - 2018 15th Learning and …, 2018 - ieeexplore.ieee.org
In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras
etc.) and manufacturing of new type of sensors resulted in a new regime of applications …

Internet of Things security: a survey

MAM Sadeeq, SRM Zeebaree, R Qashi… - 2018 International …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is a huge number of objects which communicate over a network or
the Internet. These objects are a combination of electronics, sensors, and a software to …

Towards secure smart home IoT: Manufacturer and user network access control framework

M Al-Shaboti, I Welch, A Chen… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Insecure smart home IoT network is growing in number and size, and enforcing standard
security solutions in IoT is a challenge due to its limited resources. The vulnerable smart …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

Ensuring compliance of IoT devices with their privacy policy agreement

A Subahi, G Theodorakopoulos - 2018 IEEE 6th International …, 2018 - ieeexplore.ieee.org
In the past few years, Internet of Things (IoT) devices have emerged and spread
everywhere. Many researchers have been motivated to study the security issues of IoT …

A privacy-enhancing framework for internet of things services

L Malina, G Srivastava, P Dzurenda, J Hajny… - Network and System …, 2019 - Springer
The world has seen an influx of connected devices through both smart devices and smart
cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent …

[PDF][PDF] Security of distributed intelligence in edge computing: Threats and countermeasures

MS Ansari, SH Alsamhi, Y Qiao, Y Ye… - The Cloud-to-Thing …, 2020 - library.oapen.org
Rapid growth in the amount of data produced by IoT sensors and devices has led to the
advent of edge computing wherein the data is processed at a point at or near to its origin …

LUCON: Data flow control for message-based IoT systems

J Schütte, GS Brost - … conference on trust, security and privacy …, 2018 - ieeexplore.ieee.org
Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the
exchange of data between services across enterprises. Traditional access and usage …

A secured framework for sdn-based edge computing in IOT-enabled healthcare system

J Li, J Cai, F Khan, AU Rehman… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) consists of resource-constrained smart devices capable to sense
and process data. It connects a huge number of smart sensing devices, ie, things, and …