Security Challenges and Approaches in Internet of ThingsSecuring the Internet of Things
Security Challenges and Approaches in Internet of Things: Securing the Internet of Things
Misra, Sridipta; Maheswaran, Muthucumaru; Hashmi, Salman
2016-09-04 00:00:00
[Security and privacy are the prime constraints to the popularity and acceptance of the IoT. Figure 4.1 from [179] indicates the opinions of security personnel active in the IT space on security in the IoT. According to [213], as we go back in time, the need of security and privacy in the Internet would keep decreasing. Hence security and privacy were not parts of the design of the Internet. With the evolution of the Internet into the IoT, many security and privacy issues came up, which we generally resolved by building patches.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/security-challenges-and-approaches-in-internet-of-things-securing-the-czFlIEdcog
Security Challenges and Approaches in Internet of ThingsSecuring the Internet of Things
[Security and privacy are the prime constraints to the popularity and acceptance of the IoT. Figure 4.1 from [179] indicates the opinions of security personnel active in the IT space on security in the IoT. According to [213], as we go back in time, the need of security and privacy in the Internet would keep decreasing. Hence security and privacy were not parts of the design of the Internet. With the evolution of the Internet into the IoT, many security and privacy issues came up, which we generally resolved by building patches.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.