Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey.
Vishal SharmaIlsun YouKarl AnderssonFrancesco PalmieriMubashir Husain RehmaniPublished in: CoRR (2019)
Keyphrases
- smart objects
- security services
- privacy concerns
- security issues
- mobile computing
- policy enforcement
- mobile devices
- security concerns
- electronic transactions
- security problems
- trust relationships
- security mechanisms
- rfid systems
- ambient intelligence
- statistical databases
- personal information
- personal data
- access control
- data security
- security and privacy issues
- information security
- key management
- privacy preserving
- security management
- ubiquitous computing
- preserving privacy
- location aware
- data privacy
- electronic commerce
- trusted computing
- security requirements
- privacy issues
- sensitive data
- security threats
- enterprise network
- context aware
- access control models
- everyday objects
- trust management
- smart grid
- public key infrastructure
- privacy preserving data mining
- identity management
- security risks
- security protocols
- privacy requirements
- rfid technology
- security properties
- confidential information
- mobile commerce
- electronic payment
- location information
- cloud computing
- trust model
- security measures
- management system
- mobile phone
- computing environments
- security policies
- mobile users
- big data
- trust negotiation
- wireless networks
- authentication protocol
- privacy policies
- sensitive information
- data management
- social network sites
- health information
- privacy protection
- biometric template
- network security
- mobile applications