Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security Challenges and Approaches in Internet of ThingsSecuring the Internet of Things

Security Challenges and Approaches in Internet of Things: Securing the Internet of Things [Security and privacy are the prime constraints to the popularity and acceptance of the IoT. Figure 4.1 from [179] indicates the opinions of security personnel active in the IT space on security in the IoT. According to [213], as we go back in time, the need of security and privacy in the Internet would keep decreasing. Hence security and privacy were not parts of the design of the Internet. With the evolution of the Internet into the IoT, many security and privacy issues came up, which we generally resolved by building patches.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Security Challenges and Approaches in Internet of ThingsSecuring the Internet of Things

Loading next page...
 
/lp/springer-journals/security-challenges-and-approaches-in-internet-of-things-securing-the-czFlIEdcog
Publisher
Springer International Publishing
Copyright
© The Author(s) 2017
ISBN
978-3-319-44229-7
Pages
39 –51
DOI
10.1007/978-3-319-44230-3_4
Publisher site
See Chapter on Publisher Site

Abstract

[Security and privacy are the prime constraints to the popularity and acceptance of the IoT. Figure 4.1 from [179] indicates the opinions of security personnel active in the IT space on security in the IoT. According to [213], as we go back in time, the need of security and privacy in the Internet would keep decreasing. Hence security and privacy were not parts of the design of the Internet. With the evolution of the Internet into the IoT, many security and privacy issues came up, which we generally resolved by building patches.]

Published: Sep 4, 2016

Keywords: Fault Tolerance; Security Protocol; Trust Management; Extensible Authentication Protocol; Host Identity Protocol

There are no references for this article.