STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT.
Peiying ZhangChunxiao JiangXue PangYi QianPublished in: IEEE Internet Things J. (2021)
Keyphrases
- security problems
- management system
- key management
- cloud computing
- security issues
- security requirements
- big data
- data security
- information security
- security mechanisms
- mobile computing
- edge detection
- sensor web
- computer networks
- rfid systems
- location information
- access control
- multiscale
- information assurance
- smart objects
- security systems
- image processing
- security analysis
- computer security
- security policies
- network security
- intrusion detection
- supply chain
- database systems