IoT Security, Challenges, and Solutions: A Review.
Jayashree MohantySushree MishraSibani PatraBibudhendu PatiChhabi Rani PanigrahiPublished in: ICACIE (2) (2019)
Keyphrases
- security problems
- security issues
- lessons learned
- key management
- real world
- information security
- buffer overflow
- security requirements
- intrusion detection
- computer networks
- access control
- management system
- cloud computing
- benchmark problems
- optimal solution
- security mechanisms
- case study
- data security
- practical solutions
- security threats
- mobile computing
- computer security
- literature review
- data mining