2019
DOI: 10.3390/s19081935
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities

Abstract: With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS systems, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as difficult challenges because the devices have not been designed to have effective security features.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…According to Figure 11 , the Duino coin blockchain temperature values deviate from 81 °C to 85 °C. This indicates that the heat of the Duino coin blockchain algorithm is typically high when compared to other two blockchain applications [ 35 ].…”
Section: Results and Evaluationmentioning
confidence: 99%
“…According to Figure 11 , the Duino coin blockchain temperature values deviate from 81 °C to 85 °C. This indicates that the heat of the Duino coin blockchain algorithm is typically high when compared to other two blockchain applications [ 35 ].…”
Section: Results and Evaluationmentioning
confidence: 99%
“…Internet of Things devices are tempting targets for hackers because of the variety of security threats they face as a result of their proximity to and interaction with the real world. Because of their convenience and susceptibility, they make appealing targets [12,13].…”
Section: Security Challenges and Security Requirements Of Resource-co...mentioning
confidence: 99%
“…Li et al thoroughly surveyed the IoT and investigated the related security and privacy. [71][72][73][74] In terms of wireless communication, the recent smart gateways frequently adopt WPA/WPA2, AES-128 or even AES-256, and so on. In the future, against the maturation of quantum computation and communication, complex or quantum cryptography should be utilized to providing postquantum security.…”
Section: Security and Flow Controlmentioning
confidence: 99%
“…In smart homes, security issues mainly result from the utilization of wireless communication technology because of their open channels as well as software security. Li et al thoroughly surveyed the IoT and investigated the related security and privacy 71‐74 . In terms of wireless communication, the recent smart gateways frequently adopt WPA/WPA2, AES‐128 or even AES‐256, and so on.…”
Section: Core Technologies For Smart Gatewaysmentioning
confidence: 99%