Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review.
Bin LiaoYasir AliShah NazirLong HeHabib Ullah KhanPublished in: IEEE Access (2020)
Keyphrases
- mobile computing
- literature review
- security analysis
- mobile devices
- context aware
- security requirements
- public key
- case study
- wireless networks
- smart card
- mobile users
- data management
- mobile phone
- computing environments
- mobile learning
- encryption scheme
- distributed systems
- data collection
- wireless communication
- mobile applications
- ubiquitous computing
- location based services
- learning activities
- mobile technologies
- wireless sensor networks
- database systems
- mobile services
- data access
- information security
- mobile agents
- data integration
- database management systems
- rfid tags
- end users
- databases