The Internet of Things devices and users exchange massive amount of data. Some of these exchanged messages are highly sensitive as they involve organizational, military or patient personally identifiable information. Therefore, many schemes and protocols have been put forward to protect the transmitted messages. The techniques deployed in these schemes may include blockchain, public key infrastructure, elliptic curve cryptography, physically unclonable function and radio frequency identification. In this paper, a review is provided of these schemes including their strengths and weaknesses. Based on the obtained results, it is clear that majority of these protocols have numerous security, performance and privacy issues
The idea to connect everything to anything and at any point of time is what vaguely defines the conc...
The Internet of Things, often referred to as the IoT, is an intelligent network of small sensors and...
IoT devices can be insecure and may not be able to defend themselves against a wide variety of secur...
The Internet of Things devices and users exchange massive amount of data. Some of these exchanged me...
The idea to connect everything to anything and at any point of time is what vaguely defines the conc...
The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
Data Security and privacy is one of the serious issues in internet-based computing like cloud comput...
As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy c...
The Internet of Things (IoT) represents a great opportunity to connect people, information, and thin...
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Interne...
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Interne...
The idea to connect everything to anything and at any point of time is what vaguely defines the conc...
The Internet of Things, often referred to as the IoT, is an intelligent network of small sensors and...
IoT devices can be insecure and may not be able to defend themselves against a wide variety of secur...
The Internet of Things devices and users exchange massive amount of data. Some of these exchanged me...
The idea to connect everything to anything and at any point of time is what vaguely defines the conc...
The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
© 2020 John Wiley & Sons, Ltd. Internet of Things (IoT) is a novel paradigm, which not only facilita...
Data Security and privacy is one of the serious issues in internet-based computing like cloud comput...
As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy c...
The Internet of Things (IoT) represents a great opportunity to connect people, information, and thin...
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Interne...
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. With the exponential growth of the Interne...
The idea to connect everything to anything and at any point of time is what vaguely defines the conc...
The Internet of Things, often referred to as the IoT, is an intelligent network of small sensors and...
IoT devices can be insecure and may not be able to defend themselves against a wide variety of secur...