Detailed Information

Cited 0 time in webofscience Cited 72 time in scopus
Metadata Downloads

Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey

Full metadata record
DC Field Value Language
dc.contributor.authorSharma, Vishal-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorAndersson, Karl-
dc.contributor.authorPalmieri, Francesco-
dc.contributor.authorRehmani, Mubashir Husain-
dc.contributor.authorLim, Jaedeok-
dc.date.accessioned2021-08-11T08:43:46Z-
dc.date.available2021-08-11T08:43:46Z-
dc.date.issued2020-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3693-
dc.description.abstractWith an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces non-negligible threats to M-IoT devices and platforms. Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT. There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper.-
dc.format.extent41-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleSecurity, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/ACCESS.2020.3022661-
dc.identifier.scopusid2-s2.0-85097965063-
dc.identifier.wosid000572916800001-
dc.identifier.bibliographicCitationIEEE Access, v.8, pp 167123 - 167163-
dc.citation.titleIEEE Access-
dc.citation.volume8-
dc.citation.startPage167123-
dc.citation.endPage167163-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPHYSICAL-LAYER SECURITY-
dc.subject.keywordPlusLOCATION-BASED SERVICES-
dc.subject.keywordPlusDATA AGGREGATION SCHEME-
dc.subject.keywordPlusHANDOVER AUTHENTICATION-
dc.subject.keywordPlusANONYMOUS AUTHENTICATION-
dc.subject.keywordPlusEFFICIENT PROTOCOL-
dc.subject.keywordPlusPRESERVING SCHEME-
dc.subject.keywordPlusSOCIAL INTERNET-
dc.subject.keywordPlusENABLED DEVICES-
dc.subject.keywordPlusKEY GENERATION-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorProtocols-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorComputer science-
dc.subject.keywordAuthorHandover-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthortrust-
dc.subject.keywordAuthorprotocols-
dc.subject.keywordAuthorIoT-
dc.subject.keywordAuthorM-IoT-
dc.subject.keywordAuthorsurvey and analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE