Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharma, Vishal | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Andersson, Karl | - |
dc.contributor.author | Palmieri, Francesco | - |
dc.contributor.author | Rehmani, Mubashir Husain | - |
dc.contributor.author | Lim, Jaedeok | - |
dc.date.accessioned | 2021-08-11T08:43:46Z | - |
dc.date.available | 2021-08-11T08:43:46Z | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3693 | - |
dc.description.abstract | With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces non-negligible threats to M-IoT devices and platforms. Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT. There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper. | - |
dc.format.extent | 41 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2020.3022661 | - |
dc.identifier.scopusid | 2-s2.0-85097965063 | - |
dc.identifier.wosid | 000572916800001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.8, pp 167123 - 167163 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 167123 | - |
dc.citation.endPage | 167163 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PHYSICAL-LAYER SECURITY | - |
dc.subject.keywordPlus | LOCATION-BASED SERVICES | - |
dc.subject.keywordPlus | DATA AGGREGATION SCHEME | - |
dc.subject.keywordPlus | HANDOVER AUTHENTICATION | - |
dc.subject.keywordPlus | ANONYMOUS AUTHENTICATION | - |
dc.subject.keywordPlus | EFFICIENT PROTOCOL | - |
dc.subject.keywordPlus | PRESERVING SCHEME | - |
dc.subject.keywordPlus | SOCIAL INTERNET | - |
dc.subject.keywordPlus | ENABLED DEVICES | - |
dc.subject.keywordPlus | KEY GENERATION | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Computer science | - |
dc.subject.keywordAuthor | Handover | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | trust | - |
dc.subject.keywordAuthor | protocols | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | M-IoT | - |
dc.subject.keywordAuthor | survey and analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.