Securing the Internet of Things
Top Cited Papers
- 12 September 2011
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 44 (9), 51-58
- https://doi.org/10.1109/mc.2011.291
Abstract
This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a growing economy-replete with business models that undermine the Internet's ethical use-is fully focused on exploiting the current version's foundational weaknesses.Keywords
This publication has 4 references indexed in Scilit:
- Key management systems for sensor networks in the context of the Internet of ThingsComputers and Electrical Engineering, 2011
- A cross-layer approach for integrating security mechanisms in sensor networks architecturesWireless Communications and Mobile Computing, 2011
- Identities in the Future Internet of ThingsWireless Personal Communications, 2009
- Supports for Identity Management in Ambient Environments - The Hydra ApproachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008