2018
DOI: 10.1109/mc.2018.2141038
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Trust and Security for Internet of Things Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(18 citation statements)
references
References 7 publications
1
17
0
Order By: Relevance
“…smartphone that operates between body sensors and the cloud) [256]. By implementing an edge computing framework, the ML/DL security model for the IoT system can be placed near the network edge, operate as guards to detect malicious behaviour, secure devices and reduce the severity of eavesdropping threats by approaching the IoT devices [257].…”
Section: Enabling Technology For Ml/dl Deployment For Iot Securitymentioning
confidence: 99%
“…smartphone that operates between body sensors and the cloud) [256]. By implementing an edge computing framework, the ML/DL security model for the IoT system can be placed near the network edge, operate as guards to detect malicious behaviour, secure devices and reduce the severity of eavesdropping threats by approaching the IoT devices [257].…”
Section: Enabling Technology For Ml/dl Deployment For Iot Securitymentioning
confidence: 99%
“…When compared to other ICT technologies, the security risks associated with the wearables is higher because these are devices having limited computational power, battery life, and running a weaker encryption system in general. Considering, that these wearables collect a variety of information from the users via their sensors, the way security is implemented and its effect on the user perception is directly related to their trust in the system and the usage intention [32], [33], [89], [90]. The users will distrust the wearable devices in general if they are assumed to carry too high of a risk.…”
Section: Security Concerns and Trustmentioning
confidence: 99%
“…The recent work carried out by Alsaryrah et al [11] has used optimization scheme for controlling energy consumption of IoT nodes as well as upgrading the quality of service factors. Bhattarai and Wang [12] have discussed about significance of security over IoT system and presented an adversary model for highlighting the concerns associated with privacy. Bisadi et al [13] have presented a discussion about energy management system and presented architecture towards solving it.…”
Section: A the Backgroundmentioning
confidence: 99%