Ensuring IoT/M2M System Security Under the Limitation of Constrained Gateways.
Kuan-Lin ChenFuchun Joseph LinPublished in: SpaCCS Workshops (2017)
Keyphrases
- security problems
- security issues
- key management
- management system
- information security
- access control
- cloud computing
- data security
- computer security
- security mechanisms
- information assurance
- security measures
- rfid systems
- security protocols
- security policies
- network security
- intrusion detection
- functional requirements
- security systems
- security level
- computer networks
- security management
- information systems
- security vulnerabilities
- database