2017
DOI: 10.1109/tetc.2016.2606384
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study of Security of Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
355
0
7

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 580 publications
(362 citation statements)
references
References 103 publications
0
355
0
7
Order By: Relevance
“…Level 1 Physical Devices and Controllers -This layer contains the things in the IoT. This includes a wide range of endpoint devices which can send or receive information (e.g., sensors and radio-frequency identification (RFID) readers) [5].…”
Section: Iot Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…Level 1 Physical Devices and Controllers -This layer contains the things in the IoT. This includes a wide range of endpoint devices which can send or receive information (e.g., sensors and radio-frequency identification (RFID) readers) [5].…”
Section: Iot Architecturementioning
confidence: 99%
“…Level 5 Data Abstraction -This level allows data to be stored in a more efficient way to improve performance of the higher levels. Some of the operations are normalisation, indexing, formatting, validation, consolidation of data and providing access to multiple data stores [5].…”
Section: Iot Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, lots of works [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14] have been proposed to the reliability, flexibility, survivability, and security of wireless networks. To better understand IoV, many researchers have Fig.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid growth of communication technology, network technology and increasing number of smart devices makes IoT very relevant for research exploration. Conversely the existing literature survey notices that IoT platform still suffers from privacy and security vulnerabilities [1]. The centralized architecture and less resource availability in most of the IoT devices have made the conventional security and privacy preservation approaches inappropriate for IoT platforms [2], [3] [4].…”
Section: Introductionmentioning
confidence: 99%