Proceedings of the International Conference on Internet of Things and Cloud Computing 2016
DOI: 10.1145/2896387.2906198
|View full text |Cite
|
Sign up to set email alerts
|

Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(20 citation statements)
references
References 3 publications
0
20
0
Order By: Relevance
“…are not standardized they often follow the same design pattern having similar security requirements. In [10] Raham et al show a general scheme where IoT devices are integrated with a cloud environment. The latter presents the vulnerabilities and the security issues which must be handled by the IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…are not standardized they often follow the same design pattern having similar security requirements. In [10] Raham et al show a general scheme where IoT devices are integrated with a cloud environment. The latter presents the vulnerabilities and the security issues which must be handled by the IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…So the crucial data can be easily accessed by any cybercriminal that can discover duplicate tag and hence the user cannot distinguish between duplicate and original data. 11)Eavesdropping: In this type of attack the attacker can easily get confidential information such as password or some other data which are flowing from tag to user or user to tag [23]. This type of attack can happen because RFID has wireless characteristics.…”
Section: )Tag Cloningmentioning
confidence: 99%
“…The security of an IoT system is assessed in a comprehensive manner and in not limited to a specific IoT scenario, such as embedded systems or RFID systems. Another framework that separates security requirements of IoT systems depending on their architectural layer is made by Rahman et al [34]. In their work, they propose a four layer approach, with each layer having different security needs.…”
Section: Related Workmentioning
confidence: 99%