Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
Kobra MabodiMehdi YusefiShahram ZandiyanLeili IrankhahReza FotohiPublished in: CoRR (2020)
Keyphrases
- security threats
- key management
- security mechanisms
- smart card
- security protocols
- identity management
- information security
- security issues
- resource constrained
- wireless sensor networks
- ad hoc networks
- data model
- big data
- security requirements
- secret key
- databases
- location information
- security risks
- smart objects
- mobile devices
- cloud computing
- operating system
- trust model
- database
- access control
- real time
- resource constraints
- multipath
- sensitive data
- data processing
- sensor networks
- management system
- database systems