2016 International Conference on Industrial Engineering, Management Science and Application (ICIMSA) 2016
DOI: 10.1109/icimsa.2016.7503989
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Device Security in IoT Convergence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In IoT, there is an absence of a common framework, so all the manufacturers retain privacy and security at their own risk. Once a standard framework is implemented, then the security issue will be resolved [15].…”
Section: Common Frameworkmentioning
confidence: 99%
“…In IoT, there is an absence of a common framework, so all the manufacturers retain privacy and security at their own risk. Once a standard framework is implemented, then the security issue will be resolved [15].…”
Section: Common Frameworkmentioning
confidence: 99%
“…They also identified challenges and existing gaps in current works for machine learning-based IoT security. Moh et al [43] also focused on surveying of different machine learning techniques for IoT and fog computing security. They illustrated different machine learning techniques to identify threats and attacks in IoT network and also presented machine learning based solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Invalid low power nodes might get access to the subnet cluster in the local networks. There also might be case where some of the nodes could be more resource constrained and cannot support the high requirement security mechanism/cryptographic operations such as authentication/key management and bootstrapping [7].…”
Section: Threat Vectorsmentioning
confidence: 99%
“…This node will be responsible for monitoring the behavior of nodes at local cluster and detect malicious activities and provide necessary security resources to more resource-constrained environments. To assure that only valid nodes should join the local network, a secure bootstrapping mechanism would be needed [7].…”
Section: Threat Vectorsmentioning
confidence: 99%