Q Jing, AV Vasilakos, J Wan, J Lu, D Qiu - Wireless networks, 2014 - Springer
… of challenges. This paper focuses on the securityproblems among all other challenges. As IoT is built on the basis of the Internet, securityproblems of the Internet will also show up in …
… to various securitythreats in our daily life. The majority of the securitythreats are related to leakage of information and loss of services. In IoT, the securitythreats straightforwardly are …
C Tankard - Computer Fraud & Security, 2015 - Elsevier
… A range of securityrisks have been uncovered in the devices themselves that make up the … contain security vulnerabilities and there are an average of 25 securityconcerns per device. …
… security of IoT technology. However, our study reveals some securitychallenges and issues … Consequently, the focus of this review paper is to categorize the security tasks and topics …
K Sha, W Wei, TA Yang, Z Wang, W Shi - Future generation computer …, 2018 - Elsevier
… a detailed analysis of securitychallenges in IoT systems, … of IoT securitychallenges will pave the road to better security solution design. Moreover, the differences in securitychallenges …
GS Matharu, P Upadhyay… - … conference on emerging …, 2014 - ieeexplore.ieee.org
… This paper briefs the idea of Internet of Things (IoT) and the challenges to its future growth. … of the IoT architecture, by tackling securityissues at each layer of the architecture. The paper …
A Balte, A Kashid, B Patil - International Journal of Advanced …, 2015 - shop.iotone.ir
… [5] describes different securitychallenges in Smart City. This paper describes the security issues when different devices are connected using Internet (IoT). …
Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
… security mechanisms in conventional Internet protocols need to be modified or extended to support the IoT applications. In this section, we discuss the securityproblems … InternetThings J…
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
… security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges … We conclude our paper discussing various research challenges that still exist in …