2020
DOI: 10.1109/comst.2020.2976075
|View full text |Cite
|
Sign up to set email alerts
|

Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(31 citation statements)
references
References 137 publications
0
31
0
Order By: Relevance
“…Several solutions have been proposed [146]- [149]. A central aspect is to restrict the centralized processing of neural information and ensure privacy.…”
Section: Security Privacy and Ethical Aspectsmentioning
confidence: 99%
“…Several solutions have been proposed [146]- [149]. A central aspect is to restrict the centralized processing of neural information and ensure privacy.…”
Section: Security Privacy and Ethical Aspectsmentioning
confidence: 99%
“…This will help adversaries gain control of the IoT devices. Such potential reasons may result in a series of different types of attacks in IoT, such as Distributed Denial of Services (DDoS), Man In The Middle (MITM), Zero-day, IoT botnets and ransomware [59]- [62]. Network-level security solutions are vital requisites to mitigate these attacks.…”
Section: Improving Securitymentioning
confidence: 99%
“…Genetic algorithms have limitation for dealing with a complex feature set and machine learning algorithms used for classification increases the processing time and complexity of the system in the context of resource constraint devices. Privacy is an again big challenge especially when the cloud services are used for the classification of device identification [82]. Network fingerprinting does not work below the network layers in the TCP/IP stack.…”
Section: ) DI and Supervised Mlmentioning
confidence: 99%