Adat et al., 2018 - Google Patents
Security in Internet of Things: issues, challenges, taxonomy, and architectureAdat et al., 2018
- Document ID
- 12127422654773877256
- Author
- Adat V
- Gupta B
- Publication year
- Publication venue
- Telecommunication Systems
External Links
Snippet
Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not …
- 238000011160 research 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adat et al. | Security in Internet of Things: issues, challenges, taxonomy, and architecture | |
Hameed et al. | Understanding security requirements and challenges in Internet of Things (IoT): A review | |
Almusaylim et al. | Proposing a secure RPL based internet of things routing protocol: a review | |
Grammatikis et al. | Securing the Internet of Things: Challenges, threats and solutions | |
Yousuf et al. | A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures | |
Lone et al. | A comprehensive study on cybersecurity challenges and opportunities in the IoT world | |
Airehrour et al. | Secure routing for internet of things: A survey | |
Kavitha et al. | Security vulnerabilities in wireless sensor networks: A survey | |
Boudriga | Security of mobile communications | |
Kumar et al. | Exploring data security and privacy issues in internet of things based on five-layer architecture | |
Aziz Al Kabir et al. | Securing IOT devices against emerging security threats: Challenges and mitigation techniques | |
Nath et al. | Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges | |
Mohindru et al. | Security attacks in internet of things: A review | |
Khan et al. | Understanding security requirements and challenges in internet of things (IoTs): A review | |
Marias et al. | Security and privacy issues for the network of the future | |
Babu et al. | Proactive alleviation procedure to handle black hole attack and its version | |
Badr et al. | Security and privacy in the Internet of Things: threats and challenges | |
Weissman et al. | Integrating IoT monitoring for security operation center | |
Somasundaram et al. | IOT–attacks and challenges | |
Abualhaol et al. | Securing D2D wireless links by continuous authenticity with legitimacy patterns | |
Poonia | Internet of Things (IoT) security challenges | |
Zaman et al. | Towards SDN and blockchain based IoT countermeasures: a survey | |
Li et al. | Research on wireless sensor network security | |
Periyanayagi et al. | Swarm-based defense technique for tampering and cheating attack in WSN using CPHS | |
Alrubaiei et al. | Internet of Things in Cyber Security Scope |