Managing the Web of Things 2017
DOI: 10.1016/b978-0-12-809764-9.00018-4
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues of the Web of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…WoT involves numerous heterogeneous entities interacting with each other. Given the enormous number of connected devices that are potentially vulnerable, security and privacy protection became extremely necessary [50]. In fact, poorly secured interconnected (malicious) IoT devices could serve as entry points for cyber attacks towards more critical targets.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…WoT involves numerous heterogeneous entities interacting with each other. Given the enormous number of connected devices that are potentially vulnerable, security and privacy protection became extremely necessary [50]. In fact, poorly secured interconnected (malicious) IoT devices could serve as entry points for cyber attacks towards more critical targets.…”
Section: Discussionmentioning
confidence: 99%
“…In this section, we give some considerations on current IoT technology and related security breach and solutions (if any). Source of the following discussion comes from some recent state of the art survey in the area [51–55] as well as security issues analysis of the WoT [50], where a more through discussion can be found.…”
Section: Discussionmentioning
confidence: 99%
“…In terms of the WoT, S. El Jaouhari et al [72] went through the currently proposed architectures for securing the WoT. They have presented the authorization frameworks that allow a fine-grained and flexible access control to the resources.…”
Section: Impact Of System Factors On Security Perceptionmentioning
confidence: 99%
“…They prefer to have full control of their personal information and to have enough security mechanisms to protect their data. Therefore, the authors in [72] have considered some of the main system SIFs on perceived security and privacy in terms of the WoT, such as access control, authorization, encryption, identity management, buffer overflow, etc.…”
Section: Impact Of System Factors On Security Perceptionmentioning
confidence: 99%
See 1 more Smart Citation