Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities.
Alay PatelDevam PatelRiya KakkarParita Rajiv OzaSmita AgrawalSudeep TanwarRavi SharmaNagendar YamsaniPublished in: Secur. Priv. (2024)
Keyphrases
- security problems
- key management
- security requirements
- long term
- management system
- access control
- optimal solution
- information security
- security policies
- network security
- buffer overflow
- short and long term
- security analysis
- resource constrained
- security mechanisms
- real world
- intrusion detection
- security systems
- distributed systems
- database systems
- data mining