391
Views
25
CrossRef citations to date
0
Altmetric
Articles

Security risk management in IoT environment

&

References

  • Statista - The Statistics Portal for Market Data, Market Research and Market Studies. Web. 2017. <http://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/>
  • Hong, I. J, J. A. Landey. “An Architecture for Privacy Sensitive Ubiquitous Computing MobiSys’04”, Boston, Massachusetts. 2004: 177–189
  • Bradley, J and J Barbier. “Embracing the Internet of Everything To Capture Your Share of $14. 4 Trillion: More Relevant, Valuable Connections Will Improve Innovation, Productivity, and Efficiency & Customer Experience”. CISCO Whitepaper. (2013)
  • Capgemini Consulting and Sogeti High TechInterview. Web. <http://www.capgeminiconsulting.com>.
  • Roman, R and P Nareja. “Securing the internet of things.” Computer. 44. 9 (2011): 51-58 doi: 10.1109/MC.2011.291
  • Abomhara, M. “Security and Privacy in Internet of Things: Current Status and Open Issues.” International Conference on Privacy and Security in Mobile Systems (PRISMS). (2014)
  • “Internet of Things Strategic Research Road map.” IERC-European Research Cluster on the Internet of Things. Web. 2009. <http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf>.
  • Zhou, Wei and Yan Jia. “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.” IEEE Internet of Things Journal. 6. 2 (2019): 1606-1616 doi: 10.1109/JIOT.2018.2847733
  • Krishna, Addepalli V. N. “A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography.” Journal of Information and Optimization Sciences. (2018): 1387-1399. doi: 10.1080/02522667.2018.1507762
  • Zhang, Yi, “Optimized detection algorithm of complex intrusion interference signal in mobile wireless network.” Journal of Discrete Mathematical Sciences and Cryptography 21. 3 (2018): 771-779. doi: 10.1080/09720529.2018.1449301
  • Dadheech, Pankaj. “An enhanced 4-way technique uses cookies for robust authentication process in wireless network.” Journal of Statistics and Management Systems. 22. 4 (2019): 773-782 doi: 10.1080/09720510.2019.1609557
  • Shirdel, G. H and M Abdolhosseinzadeh. “A simulated annealing heuristic for the online symmetric traveling salesman problem.” Journal of Information and Optimization Sciences. 39. 6 (2018): 1283-1296. doi: 10.1080/02522667.2017.1367494
  • Tianlong, Y. “Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things.” ACM Workshop on Hot Topics in Networks. 5. (2015)
  • Raja, Linesh, and Sonali Vyas. “The Study of Technological Development in the Field of Smart Farming.” Smart Farming Technologies for Sustainable Agricultural Development. IGI Global, 2019. 1-24.
  • Atzoril, A. “The internet of things: A survey.” Computer Networks. 54. 15 (2010): 2787–2805, Web. doi: 10.1016/j.comnet.2010.05.010
  • Sundmaeker, H and P Guillemin. “Vision and challenges for realizing the internet of things.” Cluster of European Research Projects on the Internet of Things 2010 Web.
  • Riad, A. M. “A survey of internet of things.” (2013): Web.
  • Tan, L and N Wang. “Future internet: The internet of things, in Advanced Computer Theory and Engineering.” 3rd International Conference in Advanced Computer Theory and Engineering. (2010): Web
  • Mattern, F and F Floerkemeier. “From the internet of computers to the internet of things.” Active data management to event-based systems. (2010): 242–259. Web. doi: 10.1007/978-3-642-17226-7_15
  • Mahalle, P. N and B Anggorojati. “Identity authentication and capability based access control (iacac) for the internet of things.” Journal of Cyber Security and Mobility. 1. 4 (2013): 309–348. Web.
  • Bandyopadhyay, D and J Sen. “Internet of things: Applications and challenges in technology and standardization.” Wireless Personal Communications. 58. (2011): 49–69. Web. doi: 10.1007/s11277-011-0288-5
  • Vermesan, O, P Friess and P Guillemin. “Internet of things strategic research road map.” Internet of Things: Global Technological and Societal Trends. (2011): 9-52. Web.
  • Yan, Z, P Zhang and A Vasilakos. “A survey on trust management for Internet of Things”, Journal of Network and Computer Applications, 42. (2014):120-134. Web. doi: 10.1016/j.jnca.2014.01.014
  • Iqbal, A, R Saleem, and M Suryani. “Internet of Things (IOT): ongoing Security Challenges and Risks”, International Journal of Computer Science and Information Security, 14. (2016). Web.
  • Zhao, K, L Ge. “A survey on the Internet of Things security”, Proc. 9th Int. Conf. Comput. Intell. Secur. (CIS), (2013):663-667. Web.
  • Yang, Y and L Wu. “A Survey on Security and Privacy Issues in Internet-of-Things”, IEEE Internet of Things Journal, (2017): 1250-1258. Web. doi: 10.1109/JIOT.2017.2694844
  • Sethi, P, S R Sarangi. “Internet of Things: Architecture, Protocols and Applications”, Journal of Electrical and computer engineering, (2017). Web.
  • Malik, V and S Singh. “Internet of Things: Risk Management”, SSIC, (2019). Print.
  • Sorebo, G. “Managing the unmanageable : A risk model for the Internet of Things”, RSA Conference, (2015): 1-20. Web
  • Andreas, I. “Internet of Things: Security Vulnerabilities and Challenges”, The 3rd IEEE ISCC 2015 International Workshop on Smart City and Ubiquitous Computing Applications, (2015). Web.
  • Vignesh, R. “Security on Internet of things (IoT) with Challenges and Countermeasures securing the internet of things”, International Journal of Engineering Development and Research, 5. 1(2017):417-423. Web.
  • Langheinrich, M. “Privacy by design principles of privacy-aware ubiquitous systems,” in Ubiquitous Computing, (2001):273–291. Web.
  • Mahalle, P, S Babar and N R Prasad. “Identity management framework towards internet of things (IoT): Roadmap and key challenges”, Recent Trends in Network Security and Applications, (2010): 430–439. Web. doi: 10.1007/978-3-642-14478-3_43
  • Riahi, A, Y Challal, E Natalizio and Z Chtourou. “A systematic approach for IOT security”, Distributed Computing in Sensor Systems (DCOSS), (2013):351–355. Web.
  • Romana, R, J Zhoua, J Lopezb, “On the features and challenges of security & privacy in distributed internet of things”, Computer Networks, (2013). Web.
  • Josang, A. “Conditional reasoning with subjective logic”, Journal of Multiple-Valued Logic and Soft Computing, 15 (2008): 5–38. Web.
  • “Internet of Things (IoT) and Cyber Risk Insurance | Mindtree.” Mindtree | IT Consulting & Technology Consulting. Web. 2018. <http://www.mindtree.com/blog/internet-things-iot-and-cyber-risk-insurance>.
  • Jinan, S and K Pan. “Security Patterns from intelligent data: A Map of Security Vulnerability Analysis”, IEEE 3rd International Conference on Big Data Security on Cloud, (2017):18–25. Web.
  • “CAST Highlight - Application Portfolio Analysis.” Software Intelligence for Digital Leaders | CAST. Web. 2018. <http://www.castsoftware.com/products/highlight>.
  • The world’s leading software development platform. GitHub. Web. 2018. <http://codeload.github.com/devicehive/devicehive-java-server/zip/master>.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.