[go: up one dir, main page]

Zamfiroiu et al., 2020 - Google Patents

IoT communication security issues for companies: Challenges, protocols and the web of data

Zamfiroiu et al., 2020

View PDF
Document ID
9127951679425496177
Author
Zamfiroiu A
Iancu B
Boja C
Georgescu T
Cartas C
Popa M
Toma C
Publication year
Publication venue
Proceedings of the international conference on business excellence

External Links

Snippet

This article analyzes and highlights the security perspective of Internet of Things (IoT) connected devices and their communication challenges, as IoT is considered one of the key emerging fields in Industry 4.0. The IoT architectures can consist of physical systems, virtual …
Continue reading at sciendo.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Alotaibi A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
Lu et al. Internet of Things (IoT) cybersecurity research: A review of current research topics
Aydos et al. Assessing risks and threats with layered approach to Internet of Things security
US9853996B2 (en) System and method for identifying and preventing malicious API attacks
US9450945B1 (en) Unified access controls for cloud services
Malik et al. Security risk management in IoT environment
Hewa et al. Blockchain for 5G and IoT: Opportunities and challenges
Zamfiroiu et al. IoT communication security issues for companies: Challenges, protocols and the web of data
Gyrard et al. An ontology-based approach for helping to secure the ETSI machine-to-machine architecture
Khan et al. Decentralised internet of things
Chithaluru et al. RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation
Laghari et al. Securing MQTT ecosystem: Exploring vulnerabilities, mitigations, and future trajectories
Sugitha et al. Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network
Kaur et al. A blockchain-based machine learning intrusion detection system for internet of things
Bhattacharyya et al. [Retracted] An IoT‐Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System
Sharghivand et al. Data security and privacy in industrial IoT
Wenhua et al. Data security in smart devices: Advancement, constraints and future recommendations
Al-Aqrabi et al. Dynamic authentication for intelligent sensor clouds in the Internet of Things
dos Santos et al. Enhancing a fog-oriented IoT authentication and encryption platform through deep learning-based attack detection
Sharma et al. A survey on IoT security: challenges and their solutions using machine learning and blockchain technology
Aljawarneh Formulating models to survive multimedia big content from integrity violation
Monir A Lightweight Attribute-Based Access Control System for IoT.
AlDoaies et al. Exploitation of the promising technology: using blockchain to enhance the security of IoT
Li et al. Blockchain and or based data sharing solution for internet of things
Murawat et al. Wot communication protocol security and privacy issues