Securing the Internet of Things

被引:407
|
作者
Roman, Rodrigo [1 ]
Najera, Pablo
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, E-29071 Malaga, Spain
关键词
Virtual environments; Protocols; Network security; Wireless sensor networks; Internet; Sensor systems; Virtual objects; Internet of Things; Security protocols; Sensor networks;
D O I
10.1109/MC.2011.291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things vision, every physical object has a virtual component that can produce and consume services. Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. © 2006 IEEE.
引用
收藏
页码:51 / 58
页数:8
相关论文
共 50 条
  • [31] Towards Securing Discovery Services in Internet of Things
    Datta, Soumya Kanti
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
  • [32] Challenges of securing Internet of Things devices: A survey
    Samaila, Musa G.
    Neto, Miguel
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    SECURITY AND PRIVACY, 2018, 1 (02)
  • [33] Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
    Honar Pajooh, Houshyar
    Rashid, Mohammad
    Alam, Fakhrul
    Demidenko, Serge
    SENSORS, 2021, 21 (02) : 1 - 29
  • [34] Securing Internet of Things Devices Using The Network Context
    Trnka, Michal
    Svacina, Jan
    Cerny, Tomas
    Song, Eunjee
    Hong, Jiman
    Bures, Miroslav
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4017 - 4027
  • [35] On the Application of IOT (Internet of Things) for Securing Industrial Threats
    Usman, Muhammad
    Abbas, Nazar
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 37 - 40
  • [36] Securing micro transactions in the Internet of Things with cryptography primitives
    Dari, Sukhvinder Singh
    Dhabliya, Dharmesh
    Dhablia, Anishkumar
    Dingankar, Shreyas
    Pasha, M. Jahir
    Ajani, Samir N.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 753 - 762
  • [37] Internet of Things: Securing Data using Image Steganography
    Yin, Joanne Hwan Jie
    Fen, Gan May
    Mughal, Fiza
    Iranmanesh, Vahab
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 310 - 314
  • [38] Securing the Internet of Things with Responsive Artificial Immune Systems
    Greensmith, Julie
    GECCO'15: PROCEEDINGS OF THE 2015 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2015, : 113 - 120
  • [39] Securing the Internet of Things (IoT): A Security Taxonomy for IoT
    Rizvi, Syed
    Pfeffer, Joseph, III
    Kurtz, Andrew
    Rizvi, Mohammad
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168
  • [40] Securing the Internet of Things with Recursive InterNetwork Architecture (RINA)
    Ramezanifarkhani, Toktam
    Teymoori, Peyman
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 188 - 194