2017
DOI: 10.1016/j.jnca.2017.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things security: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
436
0
4

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 969 publications
(441 citation statements)
references
References 87 publications
1
436
0
4
Order By: Relevance
“…In Probabilistic key distribution, it's not guaranteed that each node in the network shares a secure key with all other nodes, but the nodes share keys with their neighbors according to some probabilities in such way we must be able to form secure paths 5 between all entities in the network. With this approach, the scalability issues are solved, but the key management protocols become less resilient in case of nodes' comprises.…”
Section: Symmetric Key Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In Probabilistic key distribution, it's not guaranteed that each node in the network shares a secure key with all other nodes, but the nodes share keys with their neighbors according to some probabilities in such way we must be able to form secure paths 5 between all entities in the network. With this approach, the scalability issues are solved, but the key management protocols become less resilient in case of nodes' comprises.…”
Section: Symmetric Key Solutionsmentioning
confidence: 99%
“…Recently, Sicari et al investigated 5 path composed from a set of successive secure links a key management issue in distributed and dynamic Internet of Things environments [114]. They integrated two key management solutions (Dini et al [40] and Di Pietro et al [39] schemes) in their middleware based IoT architecture named NOS (NetwOrked Smart object) which has been designed initially as a distributed platform for data storage and processing between IoT devices that act as data sources and the users that act as services consumers [102,112].…”
Section: Symmetric Key Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The fourth least perceived challenge was the avoidance of malicious and unintentional security incidents involving employees, contractors and vendors (mean = 3.80). Security risks related with; verification, authorization, privacy, access to the system, applications, network, and data remain one of the main challenges for organisations when managing IoT ecosystems (Alaba et al, 2017). Thus, the human element is still considered as a constant risk of security incidents due the lack of managerial and maintenance care about access control within enterprises' ICT networks (Patel et al, 2017).…”
Section: Challenges To Individual Organizationsmentioning
confidence: 99%
“…So with the rapid development and a mixture of heterogeneous devices, it formulates very large scale of IoT infrastructure [5]. So it is predicted that IoT is feared to be under threats on its versatile technology and future capabilities [6]. The security threat to IoT such as Denial of Service, Brute Force, Man in the middle attacks and many other attacks are envisaged in the interconnected network.…”
mentioning
confidence: 99%