Manzoor, 2016 - Google Patents
Securing device connectivity in the industrial internet of things (IoT)Manzoor, 2016
- Document ID
- 7902406442921910828
- Author
- Manzoor A
- Publication year
- Publication venue
- Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective
External Links
Snippet
The Internet revolution has produced fundamental changes in the way we work and communicate. It has enabled any-to-any connectivity. This connectivity has evolved through various stages. At the first stage, we saw user locations (homes and offices) connected with …
- 238000003825 pressing 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Perrone et al. | The Day After Mirai: A Survey on MQTT Security Solutions After the Largest Cyber-attack Carried Out through an Army of IoT Devices. | |
US9749292B2 (en) | Selectively performing man in the middle decryption | |
JP5021215B2 (en) | Reliable third-party authentication for web services | |
Zamfir et al. | A security analysis on standard IoT protocols | |
US10484357B1 (en) | Method and apparatus for federated single sign on using authentication broker | |
Chien et al. | A MQTT-API-compatible IoT security-enhanced platform | |
Li et al. | Mandatory content access control for privacy protection in information centric networks | |
US20180375648A1 (en) | Systems and methods for data encryption for cloud services | |
Manzoor | Securing device connectivity in the industrial internet of things (IoT) | |
Lee et al. | MQTLS: Toward secure MQTT communication with an untrusted broker | |
Bhoi et al. | Exploring the security landscape: a comprehensive analysis of vulnerabilities, challenges, and findings in Internet Of Things (Iot) application layer protocols | |
de Hoz Diego et al. | CMXsafe: A proxy layer for securing internet-of-things communications | |
US11611541B2 (en) | Secure method to replicate on-premise secrets in a cloud environment | |
Pallickara et al. | A security framework for distributed brokering systems | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
answers Verizon | 1.2 Securing Device Connectivity in the IoT | |
Mwikyaa et al. | SHARING WEB SERVICES BETWEEN ENTERPRISES:" TRUSTED NETWORK | |
Kallapudi et al. | Securing Digital Twins: Lightweight Protocol Vulnerabilities and Mitigation Strategies | |
Regateiro et al. | Server-Side Database Credentials: A Security Enhancing Approach for Database Access | |
Äyräs | Authenticating MQTT messages using JWT: creating a PKI | |
Randhawa | Security and Trust | |
Chakaravarthi | Secure model for SOAP message communication in web services | |
Arnedo-Moreno et al. | A security framework for JXTA-overlay | |
Indrasiri | Security in WSO2 ESB | |
Laghi et al. | Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP |