- Home
- Publications
- Publication Search
- Publication Details
Title
Security in product lifecycle of IoT devices: A survey
Authors
Keywords
-
Journal
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 171, Issue -, Pages 102779
Publisher
Elsevier BV
Online
2020-08-22
DOI
10.1016/j.jnca.2020.102779
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Access control in the Internet of Things: a survey of existing approaches and open research questions
- (2019) Emmanuel Bertin et al. Annals of Telecommunications
- A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration
- (2019) Jasenka Dizdarević et al. ACM COMPUTING SURVEYS
- Designing collaborative blockchained signature-based intrusion detection in IoT environments
- (2019) Wenjuan Li et al. Future Generation Computer Systems-The International Journal of eScience
- LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
- (2019) Seyed Farhad Aghili et al. Future Generation Computer Systems-The International Journal of eScience
- A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT
- (2019) Yang Xu et al. IEEE Transactions on Industrial Informatics
- Design and Implementation of High-Availability Architecture for IoT-Cloud Services
- (2019) Hyunsik Yang et al. SENSORS
- Policy-based access control for constrained healthcare resources in the context of the Internet of Things
- (2019) Shantanu Pal et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Secure data transmission framework for confidentiality in IoTs
- (2019) Nasir N. Hurrah et al. Ad Hoc Networks
- A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
- (2019) Noshina Tariq et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Internet of things security: A top-down survey
- (2018) Djamel Eddine Kouicem et al. Computer Networks
- A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
- (2018) Amandeep Singh Sohal et al. COMPUTERS & SECURITY
- Convergence of IoT and product lifecycle management in medical health care
- (2018) Ali Hassan Sodhro et al. Future Generation Computer Systems-The International Journal of eScience
- An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications
- (2018) Kostas Kolomvatsos Future Generation Computer Systems-The International Journal of eScience
- Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
- (2018) Rodrigo Roman et al. Future Generation Computer Systems-The International Journal of eScience
- Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
- (2018) Bako Ali et al. SENSORS
- A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
- (2018) Huan Wang et al. IEEE Access
- Low Power Data Integrity in IoT Systems
- (2018) Muhammad Naveed Aman et al. IEEE Internet of Things Journal
- GROUPIT: Lightweight Group Key Management for Dynamic IoT Environments
- (2018) Yi-Hsuan Kung et al. IEEE Internet of Things Journal
- Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
- (2018) Jinbo Xiong et al. IEEE Internet of Things Journal
- A survey on emerging SDN and NFV security mechanisms for IoT systems
- (2018) IEEE Communications Surveys and Tutorials
- Confidential smart-sensing framework in the IoT era
- (2018) Fadi Al-Turjman et al. JOURNAL OF SUPERCOMPUTING
- Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
- (2018) Yang Lu et al. IEEE Internet of Things Journal
- Security in vehicles with IoT by prioritization rules, vehicle certificates and trust management
- (2018) Ivan Garcia-Magarino et al. IEEE Internet of Things Journal
- Efficient certificate revocation management schemes for IoT-based advanced metering infrastructures in smart cities
- (2018) Mumin Cebe et al. Ad Hoc Networks
- A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)
- (2018) Mohammad Dahman Alshehri et al. COMPUTING
- APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
- (2018) Zhitao Guan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An Efficient Availability Guaranteed Deployment Scheme for IoT Service Chains over Fog-Core Cloud Networks
- (2018) Ngoc-Thanh Dinh et al. SENSORS
- Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud
- (2017) Khaled Riad et al. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices
- (2017) Qinlong Huang et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Optimal Load Distribution for the Detection of VM-based DDoS Attacks in the Cloud
- (2017) Omar Abdel Wahab et al. IEEE Transactions on Services Computing
- Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated with Mobile Edge Cloud
- (2017) Dae-Young Kim et al. IEEE Access
- Availability enhancement in a four-layer based IoT use three-phase scheduling
- (2017) Yao-Te Tsai et al. Journal of Ambient Intelligence and Humanized Computing
- Mutual Authentication in IoT Systems Using Physical Unclonable Functions
- (2017) Muhammad Naveed Aman et al. IEEE Internet of Things Journal
- A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
- (2017) Jie Lin et al. IEEE Internet of Things Journal
- A Survey on Security and Privacy Issues in Internet-of-Things
- (2017) Yuchen Yang et al. IEEE Internet of Things Journal
- A Comprehensive Study of Security of Internet-of-Things
- (2017) Arsalan Mosenia et al. IEEE Transactions on Emerging Topics in Computing
- End-to-end security scheme for mobility enabled healthcare Internet of Things
- (2016) Sanaz Rahimi Moosavi et al. Future Generation Computer Systems-The International Journal of eScience
- S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things
- (2016) Shahid Raza et al. IEEE Transactions on Automation Science and Engineering
- Toward end-to-end biomet rics-based security for IoT infrastructure
- (2016) M. Shamim Hossain et al. IEEE WIRELESS COMMUNICATIONS
- CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices
- (2016) Hao Sun et al. SOFTWARE-PRACTICE & EXPERIENCE
- Trust Management for SOA-Based IoT and Its Application to Service Composition
- (2016) Ing-Ray Chen et al. IEEE Transactions on Services Computing
- Chipless Radio Frequency Identification Tag for IoT Applications
- (2016) Ali Attaran et al. IEEE Internet of Things Journal
- Fog and IoT: An Overview of Research Opportunities
- (2016) Mung Chiang et al. IEEE Internet of Things Journal
- Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
- (2015) Somia Sahraoui et al. Computer Networks
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
- (2015) Jorge Granjal et al. IEEE Communications Surveys and Tutorials
- Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
- (2015) Ala Al-Fuqaha et al. IEEE Communications Surveys and Tutorials
- Low-Energy Security: Limits and Opportunities in the Internet of Things
- (2015) Wade Trappe et al. IEEE SECURITY & PRIVACY
- Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
- (2015) Kai Fan et al. Security and Communication Networks
- Cloud-Based Automated Design and Additive Manufacturing: A Usage Data-Enabled Paradigm Shift
- (2015) Dirk Lehmhus et al. SENSORS
- Secure authentication scheme for IoT and cloud servers
- (2015) Sheetal Kalra et al. Pervasive and Mobile Computing
- A standardized approach to deal with firewall and mobility policies in the IoT
- (2015) Sylvain Kubler et al. Pervasive and Mobile Computing
- IoT-Based Configurable Information Service Platform for Product Lifecycle Management
- (2014) Hongming Cai et al. IEEE Transactions on Industrial Informatics
- IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing
- (2014) Fei Tao et al. IEEE Transactions on Industrial Informatics
- Internet of Things and BOM-Based Life Cycle Assessment of Energy-Saving and Emission-Reduction of Products
- (2014) Fei Tao et al. IEEE Transactions on Industrial Informatics
- Internet of Things in Industries: A Survey
- (2014) Li Da Xu et al. IEEE Transactions on Industrial Informatics
- A survey on trust management for Internet of Things
- (2014) Zheng Yan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Emerging approaches, challenges and opportunities in life cycle assessment
- (2014) S. Hellweg et al. SCIENCE
- A lightweight trust management based on Bayesian and Entropy for wireless sensor networks
- (2014) Shenyun Che et al. Security and Communication Networks
- Privacy and Authentication Protocol for Mobile RFID Systems
- (2014) Ben Niu et al. WIRELESS PERSONAL COMMUNICATIONS
- Universal Messaging Standards for the IoT From a Lifecycle Management Perspective
- (2014) Kary Framling et al. IEEE Internet of Things Journal
- SVELTE: Real-time intrusion detection in the Internet of Things
- (2013) Shahid Raza et al. Ad Hoc Networks
- On the features and challenges of security and privacy in distributed internet of things
- (2013) Rodrigo Roman et al. Computer Networks
- Anonymous authentication for privacy-preserving IoT target-driven applications
- (2013) Almudena Alcaide et al. COMPUTERS & SECURITY
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture
- (2013) Antonio J. Jara et al. International Journal of Ad Hoc and Ubiquitous Computing
- A capability-based security approach to manage access control in the Internet of Things
- (2013) Sergio Gusmeroli et al. MATHEMATICAL AND COMPUTER MODELLING
- PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
- (2013) Pedro Sanchez et al. SENSORS
- Internet of things: Vision, applications and research challenges
- (2012) Daniele Miorandi et al. Ad Hoc Networks
- An overview of the internet of underwater things
- (2012) Mari Carmen Domingo JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Securing the Internet of Things
- (2011) Rodrigo Roman et al. COMPUTER
- Key management systems for sensor networks in the context of the Internet of Things
- (2011) Rodrigo Roman et al. COMPUTERS & ELECTRICAL ENGINEERING
- Smart meter data: Balancing consumer privacy concerns with legitimate applications
- (2011) Eoghan McKenna et al. ENERGY POLICY
- Security Challenges in the IP-based Internet of Things
- (2011) Tobias Heer et al. WIRELESS PERSONAL COMMUNICATIONS
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- Identities in the Future Internet of Things
- (2009) Amardeo C. Sarma et al. WIRELESS PERSONAL COMMUNICATIONS
- Life cycle assessment of a floating offshore wind turbine
- (2008) Jan Weinzettel et al. RENEWABLE ENERGY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now