A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT).
Vagner Ereno QuincozesSilvio E. QuincozesJuliano F. KazienkoSimone GamaOmar CheikhrouhouAnis KoubaaPublished in: Int. J. Inf. Sec. (2024)
Keyphrases
- application layer
- security problems
- ddos attacks
- transport layer
- network layer
- physical layer
- computer networks
- management system
- key management
- security issues
- security requirements
- end to end
- security protocols
- security mechanisms
- cloud computing
- rfid systems
- expert systems
- video streaming
- cross layer
- access control
- key agreement protocol
- network security
- authentication protocol
- intrusion detection
- overlay network