Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms.
Daniel Díaz LópezMaría Blanco UribeClaudia Santiago CelyDaniel Tarquino MurgueitioEdwin Garcia GarciaPantaleone NespoliFélix Gómez MármolPublished in: Symmetry (2018)
Keyphrases
- key management
- security services
- security problems
- security mechanisms
- security requirements
- security issues
- cloud computing
- mobile agent system
- identity management
- location information
- rfid systems
- management system
- public key infrastructure
- security architecture
- ubiquitous computing
- security protocols
- service providers
- wireless sensor networks
- digital signature
- ad hoc networks
- smart objects
- payment systems
- electronic payment
- mobile payment
- resource constrained
- big data
- key distribution
- web services
- mobile commerce
- security measures
- sensor web
- access control
- smart card
- online services
- user privacy
- security properties
- stream cipher
- provably secure
- security patterns
- heterogeneous platforms
- security management
- security level
- security model
- authentication protocol
- security analysis
- key exchange protocol
- data security
- security policies
- electronic transactions
- information security
- data encryption
- encryption scheme
- integrity verification
- cryptographic protocols
- key agreement
- authentication mechanism
- data management
- sensitive data
- secret key
- access control mechanism
- public key cryptography
- trusted computing