2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2014
DOI: 10.1109/iccad.2014.7001385
|View full text |Cite
|
Sign up to set email alerts
|

Security of IoT systems: Design challenges and opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
145
0
3

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 300 publications
(149 citation statements)
references
References 18 publications
1
145
0
3
Order By: Relevance
“…Due to the large number of IoT devices interconnected, scalable protocols are needed [33]. d) Resource constraint; Sensors and actuators in IoT network have restricted security mechanisms due to their minimalist design [34]. They also have low energy requirements thus strong security such as cryptography cannot be used on all things.…”
Section: " Dynamic Global Network Infrastructure With Self-configurinmentioning
confidence: 99%
“…Due to the large number of IoT devices interconnected, scalable protocols are needed [33]. d) Resource constraint; Sensors and actuators in IoT network have restricted security mechanisms due to their minimalist design [34]. They also have low energy requirements thus strong security such as cryptography cannot be used on all things.…”
Section: " Dynamic Global Network Infrastructure With Self-configurinmentioning
confidence: 99%
“…Thus they try to compromise all parameters in one formula. According to the belief of Xu et al, hardware-based security is ideally addressed IoT security problems [15]. They grouped IoT security desiderata into two classes: the first class is security tasks and the second class is related to design metrics such as cost, size, latency, and, in particular, energy requirements, but their method is hardware and can not be converted to software.…”
Section: La-based Approach For Iotmentioning
confidence: 99%
“…Many limitations in the IoT subsystems are energy, lifetime, power, cost effectiveness. Security of IoT is of essential importance as the scope of spreading malicious attacks can be widely spread the world and would be actuated to the physical world from the service of the internet [3]. Technologies of Wireless Sensor Networks, RFID, Machine-To-Machine Interface (M2M) and services accomplished via a cloud computing serve as essential building blocks for IoT to achieve the desired application operation [4].…”
Section: Introductionmentioning
confidence: 99%