{"title":"A study of key technologies for IoT and associated security challenges","authors":"Maryam Daud, Quratulain H. Khan, Y. Saleem","doi":"10.1109/ISWSN.2017.8250042","DOIUrl":null,"url":null,"abstract":"There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.","PeriodicalId":390044,"journal":{"name":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Symposium on Wireless Systems and Networks (ISWSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWSN.2017.8250042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
There are many hitches regarding security matters for Internet of Things (IoT), which need to be solved yet, including RFID tag security, cyber security wireless security, network transmission security and privacy protection etc. This article basically explores the existing studies on IoT security issues and the mixture of two main technologies of IoT in context of their threats, corresponding security requirements and their solutions while moving toward synthesizing a model for the security and data piracy issues from various viewpoints. This generic model for implementing security comprises of, combination of security standards and corresponding security requirements heading on the functional architecture of IoT.