Zamfiroiu et al., 2020 - Google Patents
IoT communication security issues for companies: Challenges, protocols and the web of dataZamfiroiu et al., 2020
View PDF- Document ID
- 9127951679425496177
- Author
- Zamfiroiu A
- Iancu B
- Boja C
- Georgescu T
- Cartas C
- Popa M
- Toma C
- Publication year
- Publication venue
- Proceedings of the international conference on business excellence
External Links
Snippet
This article analyzes and highlights the security perspective of Internet of Things (IoT) connected devices and their communication challenges, as IoT is considered one of the key emerging fields in Industry 4.0. The IoT architectures can consist of physical systems, virtual …
- 238000004891 communication 0 title abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alotaibi | A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities | |
| Lu et al. | Internet of Things (IoT) cybersecurity research: A review of current research topics | |
| Aydos et al. | Assessing risks and threats with layered approach to Internet of Things security | |
| US9853996B2 (en) | System and method for identifying and preventing malicious API attacks | |
| US9450945B1 (en) | Unified access controls for cloud services | |
| Malik et al. | Security risk management in IoT environment | |
| Hewa et al. | Blockchain for 5G and IoT: Opportunities and challenges | |
| Zamfiroiu et al. | IoT communication security issues for companies: Challenges, protocols and the web of data | |
| Gyrard et al. | An ontology-based approach for helping to secure the ETSI machine-to-machine architecture | |
| Khan et al. | Decentralised internet of things | |
| Chithaluru et al. | RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation | |
| Laghari et al. | Securing MQTT ecosystem: Exploring vulnerabilities, mitigations, and future trajectories | |
| Sugitha et al. | Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network | |
| Kaur et al. | A blockchain-based machine learning intrusion detection system for internet of things | |
| Bhattacharyya et al. | [Retracted] An IoT‐Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System | |
| Sharghivand et al. | Data security and privacy in industrial IoT | |
| Wenhua et al. | Data security in smart devices: Advancement, constraints and future recommendations | |
| Al-Aqrabi et al. | Dynamic authentication for intelligent sensor clouds in the Internet of Things | |
| dos Santos et al. | Enhancing a fog-oriented IoT authentication and encryption platform through deep learning-based attack detection | |
| Sharma et al. | A survey on IoT security: challenges and their solutions using machine learning and blockchain technology | |
| Aljawarneh | Formulating models to survive multimedia big content from integrity violation | |
| Monir | A Lightweight Attribute-Based Access Control System for IoT. | |
| AlDoaies et al. | Exploitation of the promising technology: using blockchain to enhance the security of IoT | |
| Li et al. | Blockchain and or based data sharing solution for internet of things | |
| Murawat et al. | Wot communication protocol security and privacy issues |