[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sun et al., 2024 - Google Patents

A survey of iot privacy security: Architecture, technology, challenges, and trends

Sun et al., 2024

View PDF
Document ID
1136678390724039212
Author
Sun P
Shen S
Wan Y
Wu Z
Fang Z
Gao X
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control and report environmental changes, prevent fires, and perform many more beneficial functions. However, all these benefits come at the tremendous risk of loss of privacy and …
Continue reading at erepo.uef.fi (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Al‐Turjman et al. An overview of security and privacy in smart cities' IoT communications
Atlam et al. IoT security, privacy, safety and ethics
Nazir et al. Survey on wireless network security
Razzaq et al. Security issues in the Internet of Things (IoT): A comprehensive study
Jamali et al. Towards the internet of things
Sun et al. A survey of iot privacy security: Architecture, technology, challenges, and trends
Khan et al. Data and privacy: Getting consumers to trust products enabled by the Internet of Things
Ghorbani et al. Security challenges in internet of things: survey
Sardar et al. Web of things: security challenges and mechanisms
Yang et al. A Comprehensive Survey of Security Issues of Smart Home System:“Spear” and “Shields,” Theory and Practice
Abuagoub IoT security evolution: challenges and countermeasures review
Babu et al. Development of cyber security and privacy by precision decentralized actionable threat and risk management for mobile communication using Internet of Things (IOT)
Khalid et al. Cybersecurity in Industry 4.0 context: Background, issues, and future directions
Pourrahmani et al. A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
Zhong et al. Security and Privacy for Next-Generation Wireless Networks
Nag et al. Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things
Kokila et al. Authentication, Access Control and Scalability models in Internet of Things Security-A Review
Sombatruang et al. Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}
Vyshnavi et al. Network Security tools and applications in Research Perspective
Devarakonda et al. Critical issues in the invasion of the Internet of Things (IoT): Security, privacy, and other vulnerabilities
Boussard et al. A process for generating concrete architectures
Gijare et al. Designing a Decentralized IoT-WSN Architecture Using Blockchain Technology
Gu et al. IoT security and new trends of solutions
Gandhi et al. Classification of Vulnerabilities in Cyber Physical Systems: Approach, Security and Challenges
Alsalim et al. Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities