[go: up one dir, main page]

Wu, 2021 - Google Patents

A comprehensive set of security measures for IOT

Wu, 2021

Document ID
7547193384641638345
Author
Wu C
Publication year
Publication venue
Internet of Things Security: Architectures and Security Measures

External Links

Snippet

By scrutinizing minor differences between different security requirements, this chapter presents a set of security measures for IoT. The proposed set of security measures categorizes security requirements in different aspects, including physical security, execution …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
US10542002B2 (en) Systems and methods for device authentication
Ahemd et al. IoT security: A layered approach for attacks & defenses
Islam et al. An analysis of cybersecurity attacks against internet of things and security solutions
Andrea et al. Internet of Things: Security vulnerabilities and challenges
US9356940B2 (en) Security and access system based on multi-dimensional location characteristics
Sumitra et al. A survey of cloud authentication attacks and solution approaches
US10263782B2 (en) Soft-token authentication system
KR20190048587A (en) METHOD FOR SECURITING REMOTELY INTERNET OF THINGS(IoT) AND APPARATUS USING THE SAME
Chhetri et al. Identifying vulnerabilities in security and privacy of smart home devices
Mbarek et al. Trust-based authentication for smart home systems
Fröhlich et al. A secure IIoT gateway architecture based on trusted execution environments
Valadares et al. Security challenges and recommendations in 5G-IoT scenarios
Sehgal et al. Cloud computing and information security
Wood et al. Security of distributed, ubiquitous, and embedded computing platforms
Rani et al. Classification of security issues and cyber attacks in layered internet of things
Wu A comprehensive set of security measures for IOT
Fathalla et al. Towards a Lightweight Self-Sovereign Identity Framework for IoT Network in a zero trust Environment
Wu IoT Perception Layer Security
Sun et al. DNA-X: Dynamic network authentication using SGX
Vemuri et al. Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Shoba Bindu et al. Security in ubiquitous computing environment: Vulnerabilities, attacks and defenses
JP2005151004A (en) Wireless tag privacy protection method, wireless tag device, security server device, wireless tag device program, and security server device program
Shree et al. Understanding the limitations of authentication protocols employed by existing information security models for networked applications
US11811915B1 (en) Stateless system to protect data
Zahra et al. Security Issues in Internet of Things (IoT): Challenges and Solutions