Universal Layers of IoT Architecture and Its Security Analysis
暂无分享,去创建一个
[1] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[2] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[3] Prasad Calyam,et al. Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..
[4] Adam A. Bahishti. Humanoid Robots and Human Society , 2017 .
[5] Rahim Rahmani,et al. Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.
[6] Murad Khan,et al. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .
[7] Nelson Luis Saldanha da Fonseca,et al. The Internet of Things, Fog and Cloud Continuum: Integration and Challenges , 2018, Internet Things.
[8] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[9] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[10] Marie Pelleau,et al. 1 – State of the Art , 2015 .
[11] Lan Li. Study on security architecture in the Internet of Things , 2012 .
[12] Nirwan Ansari,et al. Dynamic Resource Caching in the IoT Application Layer for Smart Cities , 2018, IEEE Internet of Things Journal.
[13] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[14] Jing Chen,et al. Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..
[15] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[16] Yasir Mehmood,et al. Enabling Communication Technologies for Smart Cities , 2017, IEEE Communications Magazine.
[17] Hüseyin Yildirim,et al. A model for predicting user intention to use wearable IoT devices at the workplace , 2019, J. King Saud Univ. Comput. Inf. Sci..
[18] Alaa Hassan. Lightweight Cryptography for the Internet of Things , 2021 .
[19] Tariq Aziz,et al. Security Challenges Facing IoT Layers and its Protective Measures , 2018 .
[20] Alessandro Neri,et al. A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).
[21] Sung-Ju Lee,et al. Intelligent positive computing with mobile, wearable, and IoT devices: Literature review and research directions , 2019, Ad Hoc Networks.
[22] Phil Beecher. Enterprise-grade networks: the answer to IoT security challenges , 2018, Netw. Secur..
[23] Ahmad Almogren,et al. Workload aware VM consolidation method in edge/cloud computing for IoT applications , 2019, J. Parallel Distributed Comput..
[24] Yuan Tian,et al. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home , 2018, ArXiv.
[25] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[26] Yi Zhang,et al. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice , 2018, J. Hardw. Syst. Secur..
[27] Choong Seon Hong,et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..
[28] Ibrahim Korpeoglu,et al. Fog-Based Data Distribution Service (F-DAD) for Internet of Things (IoT) applications , 2019, Future Gener. Comput. Syst..
[29] D KavyashreeE. 6LoWPAN NETWORK USING CONTIKI OPERATING SYSTEM , 2018 .
[30] Changiz Valmohammadi. Examining the perception of Iranian organizations on Internet of Things solutions and applications , 2016 .
[31] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[32] Giancarlo Fortino,et al. Autonomic computation offloading in mobile edge for IoT applications , 2019, Future Gener. Comput. Syst..