Internet of things security: A top-down survey
Top Cited Papers
- 1 August 2018
- journal article
- review article
- Published by Elsevier in Computer Networks
- Vol. 141, 199-221
- https://doi.org/10.1016/j.comnet.2018.03.012
Abstract
No abstract availableKeywords
Funding Information
- National Agency for Research (ANR-11-IDEX-0004-02)
This publication has 68 references indexed in Scilit:
- Secure and Efficient Control Transfer for IoT DevicesInternational Journal of Distributed Sensor Networks, 2013
- A dependability evaluation tool for the Internet of ThingsComputers and Electrical Engineering, 2013
- A capability-based security approach to manage access control in the Internet of ThingsMathematical and Computer Modelling, 2013
- Anonymous authentication for privacy-preserving IoT target-driven applicationsComputers & Security, 2013
- The best keying protocol for sensor networksPervasive and Mobile Computing, 2013
- On the features and challenges of security and privacy in distributed internet of thingsComputer Networks, 2013
- LEAP+ACM Transactions on Sensor Networks, 2006
- A Key Predistribution Scheme for Sensor Networks Using Deployment KnowledgeIEEE Transactions on Dependable and Secure Computing, 2006
- Providing secrecy in key management protocols for large wireless sensors networksAd Hoc Networks, 2003
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002