2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) 2017
DOI: 10.1109/cscloud.2017.62
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End IoT Security Middleware for Cloud-Fog Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(21 citation statements)
references
References 11 publications
0
19
0
2
Order By: Relevance
“…So far, several many protocols have been proposed to ensure IoT security, e.g. [5], [6], [7], [8], [9], however, most of them have failed in providing their security goals [10], [11], [12], [13] and various attacks, such as the protocol's secret values disclosure, desynchronization, traceability, impersonation were reported against those protocols. For example, Lee et al proposed a new authenticated group key agreement protocol for imbalanced wireless networks [14].…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…So far, several many protocols have been proposed to ensure IoT security, e.g. [5], [6], [7], [8], [9], however, most of them have failed in providing their security goals [10], [11], [12], [13] and various attacks, such as the protocol's secret values disclosure, desynchronization, traceability, impersonation were reported against those protocols. For example, Lee et al proposed a new authenticated group key agreement protocol for imbalanced wireless networks [14].…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…Although a number of IoT security solutions and a few lightweight security frameworks attempt to address many problems in the area of IoT security and privacy, such as Endto-End (E2E) security [22], [23], privacy preservation [24], [25], and blockchain-based security solutions 1 [26], [27], these questions remain unresolved. Consequently, the framework proposed in this paper seeks to provide answers to these important questions.…”
Section: Introductionmentioning
confidence: 99%
“…Fig 1 represents the watermarking algorithm. The encryption of solution visual impacts and computational overheads are minimized as well as high efficiency video coding (HEVC) standards and Advanced Video coding (H.264/ AVC) watermarking compliant are designed correctly [41]. The Un-compressed Video Watermarking optimization depends upon DWT and SVD has proposed to improve the robustness [38].…”
Section: Introductionmentioning
confidence: 99%