2011 International Conference on Internet Technology and Applications 2011
DOI: 10.1109/itap.2011.6006307
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Security Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 95 publications
(39 citation statements)
references
References 0 publications
0
38
0
1
Order By: Relevance
“…These factors creates tranquility, for example, being able to monitor home from anywhere in the world having a smartphone connected to Internet. Nevertheless, in accordance with a study handle by [8] these constant monitoring levels are exposed to confident levels to analyze the risks, for example, the network points and transmission thereof. The authors finally conclude the need to review the processes of encryption and authentication of this.…”
Section: A Review Stagementioning
confidence: 94%
“…These factors creates tranquility, for example, being able to monitor home from anywhere in the world having a smartphone connected to Internet. Nevertheless, in accordance with a study handle by [8] these constant monitoring levels are exposed to confident levels to analyze the risks, for example, the network points and transmission thereof. The authors finally conclude the need to review the processes of encryption and authentication of this.…”
Section: A Review Stagementioning
confidence: 94%
“…Various basic networks including, mobile/ private network, wireless and wired network offers and affirms the underlying connection. IoTs are set up in this new network which is composed Business applications of networks [2].…”
Section: Architecture and Protocal Stack Of Iotsmentioning
confidence: 99%
“…Thus authentication and authorization are key to ensuring that only authenticated devices (those that share a suitable key) can join the network. The main challenge, when it comes to authentication of various IoT devices, is the design of key storage and distribution mechanisms, because of the nature of the IoT devices and their network architecture [3].…”
Section: Introductionmentioning
confidence: 99%