What's next for blockchain-technology in IoT security?
Kodey CrandallMatt NorthPublished in: AMCIS (2020)
Keyphrases
- data encryption
- security problems
- management system
- key management
- information security
- security issues
- data processing
- intrusion detection
- cost effective
- access control
- rapid development
- statistical databases
- security mechanisms
- case study
- information processing systems
- sensor technology
- security systems
- computer security
- personal computer
- context aware
- security requirements
- security protocols
- data security
- security policies
- data management
- security threats
- radio frequency identification rfid
- security architecture
- big data
- anomaly detection