4.3 Article

Security in Internet of Things: issues, challenges, taxonomy, and architecture

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Secure integration of IoT and Cloud Computing

Christos Stergiou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

Aakanksha Tewari et al.

JOURNAL OF SUPERCOMPUTING (2017)

Article Engineering, Electrical & Electronic

Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges

Linghe Kong et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Review Green & Sustainable Science & Technology

A review of Internet of Things for smart home: Challenges and solutions

Biljana L. Risteska Stojkoska et al.

JOURNAL OF CLEANER PRODUCTION (2017)

Article Computer Science, Information Systems

Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and Ciphertexts

Vanga Odelu et al.

IEEE ACCESS (2017)

Article Computer Science, Theory & Methods

Integration of Cloud computing and Internet of Things: A survey

Alessio Botta et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Zhihua Xia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Artificial Intelligence

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing

Jin Li et al.

KNOWLEDGE-BASED SYSTEMS (2015)

Article Computer Science, Information Systems

Secure authentication scheme for IoT and cloud servers

Sheetal Kalra et al.

PERVASIVE AND MOBILE COMPUTING (2015)

Article Law

Internet of things: Privacy issues revisited

Rolf H. Weber

COMPUTER LAW & SECURITY REVIEW (2015)

Article Computer Science, Hardware & Architecture

A survey on trust management for Internet of Things

Zheng Yan et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza et al.

AD HOC NETWORKS (2013)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks

Anhtuan Le et al.

IEEE SENSORS JOURNAL (2013)

Article Computer Science, Information Systems

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

Linus Wallgren et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Engineering, Electrical & Electronic

6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach

Anhtuan Le et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)

Article Chemistry, Analytical

RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

Syed Obaid Amin et al.

SENSORS (2009)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)

Article Engineering, Electrical & Electronic

A survey on sensor networks

IF Akyildiz et al.

IEEE COMMUNICATIONS MAGAZINE (2002)