2021
DOI: 10.1007/s12652-021-03122-y
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Internet of Things (IoT) data transmission security corresponding to device verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Because of the increasing number of IoT devices and cyberattacks, there is various existing research on security issues for different applications and environments [14]. Chaudhry et al [15] offered an anonymous device-to-device access control mechanism for the Internet of Medical ings.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the increasing number of IoT devices and cyberattacks, there is various existing research on security issues for different applications and environments [14]. Chaudhry et al [15] offered an anonymous device-to-device access control mechanism for the Internet of Medical ings.…”
Section: Related Workmentioning
confidence: 99%
“…A robust multi-level security method was designed in [7] to avoid adversaries and guaranteed data confidentiality. Hybrid IoT was designed in [8] for device verification. However, the computational cost was not reduced.…”
Section: Introductionmentioning
confidence: 99%
“…Sensors are placed in schools or homes to collect temperature, carbon monoxide, or pyroelectric data. Although WSNs make people's lives more efficient and convenient, they also create security problems [14][15][16]. For example, in 2016, a massive network outage in the eastern United States was caused by hackers who exploited vulnerabilities in communication protocols through a distributed denial-of-service attack [17,18].…”
Section: Introductionmentioning
confidence: 99%