IoT Security: An End-to-End View and Case Study.
Zhen LingKaizheng LiuYiling XuChao GaoYier JinCliff C. ZouXinwen FuWei ZhaoPublished in: CoRR (2018)
Keyphrases
- end to end
- case study
- ad hoc networks
- key management
- security problems
- congestion control
- access control
- management system
- high bandwidth
- admission control
- wireless ad hoc networks
- network security
- security issues
- multipath
- application layer
- intrusion detection
- rate allocation
- scalable video
- information security
- cloud computing
- multi hop
- service delivery