Towards Security on Internet of Things:Applications and Challenges in Technology

Get Started. It's Free
or sign up with your email address
Rocket clouds
Towards Security on Internet of Things:Applications and Challenges in Technology by Mind Map: Towards Security on Internet of Things:Applications and Challenges in Technology

1. Security technology analysis of IoT

1.1. Architecture of IOT. Zhejiang University. Institute of IOT

1.2. The Emergence and Development of IOT

1.3. INTRSN: Intrusion-tolerent rounting in wireless sensor networks. In: Proceedings if the 23rd IEEE.International Conference on Distributed Computing Systems

2. Internet of things (IoT) security: Current status, challenges and prospective measures

2.1. Security and privacy in the Internet of Things: Current status and open issues

2.2. A survey on the intemet of things security

2.3. The social intemet of things (siot)-when social networks meet the intemet of things: Concept architecture and network characterization

2.4. A federated architecture approach for Internet of Things security

2.5. Identity authentication and capability based access control (iacac) for the internet of things

2.6. A Critical Analysis on the Security Concerns of Internet of Things (loT)

3. IWhy is IPSec a viable option for wireless sensor networks.

3.1. Wireless sensor network security: A survey

3.2. Denial of service in sensor networks

3.3. IEEE 802.15.4 Low Rate –Wireless Personal Area Network Coexistence Issues

3.4. Secure routing in wireless sensor networks: Attacks and countermeasures

3.5. Transmission of IPv6 packets over IEEE 802.15. 4 networks

3.6. IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals

4. INTERNET-OF-THINGS: GENESIS, CHALLENGES AND APPLICATIONS

4.1. Internet of Things Global Standards Initiative

4.2. The Iot-Concepts and Problem Statemant

4.3. The Internet of Things:from RFID to the next generation pervasive networked systems

4.4. A Survey of Standards for Machine-to-Machine and the Internet of Things

4.5. The Internet of Things: Between the Revolution of the Internet and the Metamorphosis of Objects

4.6. The internet of things: How the next evolution of the internet is changing everything

5. INTERNET-OF-THINGS: GENESIS, CHALLENGES AND APPLICATIONS

5.1. Distributed and cloud computing: from parallel processing to the internet of things

5.2. Developing an iot smart city framework

5.3. Home Health Hub Internet of Things (H3IoT): An architectural framework for monitoring health of elderly people

5.4. A delay-tolerant framework for integrated RSNs in IoT

5.5. Market-based user innovation in the Internet of Things

5.6. Architecture of an interoperable IoT platform based on microservices

6. Why is IPSec a viable option for wireless sensor networks.

6.1. Security for the internet of things: a survey of existing protocols and open research issues

6.2. Securing communication in 6LoWPAN with compressed IPsec

6.3. IoT security: Review, blockchain solutions, and open challenges

6.4. Secure communication for the Internet of Things—a comparison of link‐layer security and IPsec for 6LoWPAN

6.5. An architecture based on internet of things to support mobility and security in medical environments

6.6. Secure routing for internet of things: A survey

7. Security technology analysis of IoT

7.1. Internet of Things Security based on Devices Architecture

7.2. A survey of IoT security: Risks, requirements, trends, and key technologies

7.3. Towards Security on Internet of Things: Applications and Challenges in Technology

7.4. Automation of boiler process at thermal power plant using sensors and IoT

8. Internet of things (IoT) security: Current status, challenges and prospective measures

8.1. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications

8.2. Cyber physical systems security: Analysis, challenges and solutions

8.3. Context-aware computing, learning, and big data in internet of things: a survey

8.4. Internet of Things (IoT): A vision, architectural elements, and security issues

8.5. Security attacks in IoT: A survey

8.6. Standards, security and business models: key challenges for the IoT scenario

8.7. A survey on secure communication protocols for IoT systems

8.8. Using machine learning to secure IoT systems

9. Implementing IPsec in wireless sensor networks

9.1. On securing IEEE 802.15. 4 networks through a standard compliant framework

9.2. 6LoWPAN multi-layered security protocol based on IEEE 802.15. 4 security features

9.3. Lightweight key agreement protocol for IoT based on IKEv2

9.4. Collaborative key exchange system based on Chinese remainder theorem in heterogeneous wireless sensor networks

9.5. A survey: Authentication protocols for wireless sensor network in the internet of things; keys and attacks

9.6. Towards Security on Internet of Things: Applications and Challenges in Technology

9.7. Improving network performance: an evaluation of TCP/UDP on networks

10. Implementing IPsec in wireless sensor networks

10.1. RFC 4919-IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals

10.2. RFC 6282-Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks

10.3. IPv6 over low power WPAN security analysis

10.4. EEE Computer Society.

10.5. Internet Protocol, Version 6 (IPv6) Specification

10.6. IP Authentication Header. RFC 4302

10.7. Multiprecision Integer and Rational Arithmetic C/C++ Library

11. Survey on security in Internet of Things: State of the art and challenges

11.1. Securing the Internet of Things: challenges, threats and solutions

11.2. The application of internet of things in healthcare: a systematic literature review and classification

11.3. Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review

11.4. Towards Security on Internet of Things: Applications and Challenges in Technology

11.5. Multi-access edge computing aided mobility for privacy protection in internet of things

11.6. Internet of Things (IoT) Security Challenges

12. Survey on security in Internet of Things: State of the art and challenges

12.1. The Internet of Everything: Creating Better Experiences in Unimaginable Ways

12.2. CREDS 2014-Position Paper: Four Ethical Issues in Online Trust

12.3. Understanding the Issues and Challenges of a More Connected WorId

12.4. Security Assessment of the Internet Protocol version 6 (IPv6)

12.5. RFID Basics: How RFID Tags Work

12.6. ZigBee: Brief Introduction

12.7. IPv6 over Low Power WPAN Security Analysis