Batalla et al., 2017 - Google Patents
Secure smart homes: Opportunities and challengesBatalla et al., 2017
View PDF- Document ID
- 11614228325918031394
- Author
- Batalla J
- Vasilakos A
- Gajewski M
- Publication year
- Publication venue
- ACM Computing Surveys (CSUR)
External Links
Snippet
The Smart Home concept integrates smart applications in the daily human life. In recent years, Smart Homes have increased security and management challenges due to the low capacity of small sensors, multiple connectivity to the Internet for efficient applications (use of …
- 230000001965 increased 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
- H04L67/025—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Batalla et al. | Secure smart homes: Opportunities and challenges | |
| Hasan et al. | A survey on key agreement and authentication protocol for internet of things application | |
| Khalil et al. | A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions | |
| Samaila et al. | Challenges of securing Internet of Things devices: A survey | |
| Yousuf et al. | Internet of things (IoT) security: current status, challenges and countermeasures | |
| Mahmoud et al. | Internet of things (IoT) security: Current status, challenges and prospective measures | |
| Yang et al. | A comprehensive survey of security issues of smart home system:“Spear” and “Shields,” theory and practice | |
| Yan et al. | A survey on cyber security for smart grid communications | |
| Batalla et al. | RETRACTED ARTICLE: Deployment of smart home management system at the edge: mechanisms and protocols | |
| Patwary et al. | Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review | |
| Girgenti et al. | On the feasibility of attribute-based encryption on constrained IoT devices for smart systems | |
| Obert et al. | Recommendations for trust and encryption in DER interoperability standards | |
| Panwar et al. | Smart home survey on security and privacy | |
| Amanlou et al. | Cybersecurity challenges in smart grid systems: Current and emerging attacks, opportunities, and recommendations | |
| Jabraeil Jamali et al. | IoT security | |
| Kane et al. | Network architecture and authentication scheme for LoRa 2.4 GHz smart homes | |
| Kumar et al. | Advance comprehensive analysis for Zigbee network-based IoT system security | |
| Uppuluri et al. | Review of security and privacy-based IoT smart home access control devices | |
| Darem et al. | Cybersecurity threats and countermeasures of the smart home ecosystem | |
| Chen | Security management for the internet of things | |
| Wilson | Inter-device authentication protocol for the internet of things | |
| Youm | An overview of security and privacy issues for Internet of Things | |
| Hussain et al. | Security threats in M2M networks: a survey with case study | |
| Oberhofer et al. | Market Research on IIoT Standard Compliance Monitoring Providers and deriving Attributes for IIoT Compliance Monitoring | |
| Ullah et al. | Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges. |