2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766407
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 69 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…However, this approach is not aware about effective key management. Chen and Tzeng et al [4] designed a policy based on the shared key derivation method for securing the data sharing among a group . This methodology uses a binary tree for the computation of the keys.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach is not aware about effective key management. Chen and Tzeng et al [4] designed a policy based on the shared key derivation method for securing the data sharing among a group . This methodology uses a binary tree for the computation of the keys.…”
Section: Related Workmentioning
confidence: 99%
“…However, they require a large amount of security data to train the model. The monitoring system should be efficient and able to adapt to different safety environments [29]. However, due to the limitations of the edge device itself, many complex deep learning models are difficult to perform well.…”
Section: Security Protection Of Edge Computingmentioning
confidence: 99%
“…The algorithms used for ESP-8266 built on a RISC(Reduced Intrusion Set Computer) based platform and ESP-8266 even has a software development kit that allowed the users to program the device rather than using a different micro-controller altogether. [9] A V-Band Transceiver With Integrated Resonator and Receiver/Transmitter Antenna for Near-Field IoT (2018) presents a V-band transceiver for NF-IoT without the conventional low noise amplifier, mixers, power amplifier, and phase-locked loop building blocks. Also, there are no external components except a battery or energy scavenger.…”
Section: F Observationmentioning
confidence: 99%