2020
DOI: 10.1007/s11277-020-07649-9
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in IoT: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 160 publications
(55 citation statements)
references
References 65 publications
0
37
0
Order By: Relevance
“…In [17] an extensive survey on the security, privacy and authentication challenges in internet of things confirmed the fact that although there have been. improvement in the design and development of cryptographic solutions tailored for the individual elements within IoT, there is equally an increase in the number of exploitation of attacks in recent times.…”
Section: Internet-of-things Securitymentioning
confidence: 93%
“…In [17] an extensive survey on the security, privacy and authentication challenges in internet of things confirmed the fact that although there have been. improvement in the design and development of cryptographic solutions tailored for the individual elements within IoT, there is equally an increase in the number of exploitation of attacks in recent times.…”
Section: Internet-of-things Securitymentioning
confidence: 93%
“…The ranking algorithms for sensors with sensory feedback mechanisms present in IoT are CAS-SARAM in which the user selects the sensor attributes and inputs the weights of each sensor attribute to ensure that their sum is 1, and then, the Euclidean distance algorithm is used for the ranking calculation, which is ranked according to the distance; the algorithm is simple but loses some accuracy; in literature [16], AHP is used for the weighting of relatively several sensor attributes for normalized calculation of weighted scores for dependencies among sensor nodes, etc., in the underlying IoT and ranking according to the size of the scores; literature [17] proposed a similarity comparison ranking algorithm to compare the similarity of the output data of a given sensor over some time with the user search output data for ranking. The literature [18] proposed a prediction using statistical data from the past period, and the search and prediction model helps to find the matching sensors retrieved with the minimum number of sensor data.…”
Section: Application Of Sensor Technologymentioning
confidence: 99%
“…Apparent temperature (AT) is calculated based on temperature (T), relative humidity (RH), water pressure (e) and wind speed (V) according to formulas (4-1) and (4-2) [31]. 8 User interface in App-3…”
Section: Fig 6 Uart Connectionmentioning
confidence: 99%