Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices.
Syeda Mariam MuzammalMunam Ali ShahSijing ZhangHongji YangPublished in: Int. J. Autom. Comput. (2016)
Keyphrases
- comparative evaluation
- security risks
- smart devices
- security threats
- security mechanisms
- information security
- daily life
- network security
- security issues
- embedded devices
- smart phones
- security requirements
- ubiquitous computing
- resource constrained
- key management
- access control
- security policies
- smart card
- operating system
- smart environments
- sensitive data
- mobile devices
- security protocols
- intrusion detection