Sun et al., 2024 - Google Patents
A survey of iot privacy security: Architecture, technology, challenges, and trendsSun et al., 2024
View PDF- Document ID
- 1136678390724039212
- Author
- Sun P
- Shen S
- Wan Y
- Wu Z
- Fang Z
- Gao X
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control and report environmental changes, prevent fires, and perform many more beneficial functions. However, all these benefits come at the tremendous risk of loss of privacy and …
- 238000005516 engineering process 0 title description 95
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al‐Turjman et al. | An overview of security and privacy in smart cities' IoT communications | |
Atlam et al. | IoT security, privacy, safety and ethics | |
Nazir et al. | Survey on wireless network security | |
Razzaq et al. | Security issues in the Internet of Things (IoT): A comprehensive study | |
Jamali et al. | Towards the internet of things | |
Sun et al. | A survey of iot privacy security: Architecture, technology, challenges, and trends | |
Khan et al. | Data and privacy: Getting consumers to trust products enabled by the Internet of Things | |
Ghorbani et al. | Security challenges in internet of things: survey | |
Sardar et al. | Web of things: security challenges and mechanisms | |
Yang et al. | A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice | |
Abuagoub | IoT security evolution: challenges and countermeasures review | |
Babu et al. | Development of cyber security and privacy by precision decentralized actionable threat and risk management for mobile communication using Internet of Things (IOT) | |
Khalid et al. | Cybersecurity in Industry 4.0 context: Background, issues, and future directions | |
Pourrahmani et al. | A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain | |
Zhong et al. | Security and Privacy for Next-Generation Wireless Networks | |
Nag et al. | Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things | |
Kokila et al. | Authentication, Access Control and Scalability models in Internet of Things Security-A Review | |
Sombatruang et al. | Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT} | |
Vyshnavi et al. | Network Security tools and applications in Research Perspective | |
Devarakonda et al. | Critical issues in the invasion of the Internet of Things (IoT): Security, privacy, and other vulnerabilities | |
Boussard et al. | A process for generating concrete architectures | |
Gijare et al. | Designing a Decentralized IoT-WSN Architecture Using Blockchain Technology | |
Gu et al. | IoT security and new trends of solutions | |
Gandhi et al. | Classification of Vulnerabilities in Cyber Physical Systems: Approach, Security and Challenges | |
Alsalim et al. | Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities |