Security Requirements in Iot Environments
dc.authorscopusid | 57822491800 | |
dc.authorscopusid | 7004305370 | |
dc.authorscopusid | 57821219800 | |
dc.contributor.author | Binglaw,F. | |
dc.contributor.author | Koyuncu,M. | |
dc.contributor.author | Pusatlı,T. | |
dc.contributor.other | Information Systems Engineering | |
dc.date.accessioned | 2024-07-05T15:49:58Z | |
dc.date.available | 2024-07-05T15:49:58Z | |
dc.date.issued | 2022 | |
dc.department | Atılım University | en_US |
dc.department-temp | Binglaw F., Graduate School of Natural and Applied Science, Atilim University, Ankara, Turkey; Koyuncu M., Atilim University, Ankara, Turkey; Pusatlı T., Cankaya University, Ankara, Turkey | en_US |
dc.description.abstract | The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. | en_US |
dc.identifier.citationcount | 0 | |
dc.identifier.doi | 10.1007/978-3-030-95987-6_6 | |
dc.identifier.endpage | 96 | en_US |
dc.identifier.isbn | 978-303095986-9 | |
dc.identifier.issn | 1867-8211 | |
dc.identifier.scopus | 2-s2.0-85135011523 | |
dc.identifier.scopusquality | Q4 | |
dc.identifier.startpage | 84 | en_US |
dc.identifier.uri | https://doi.org/10.1007/978-3-030-95987-6_6 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14411/4070 | |
dc.identifier.volume | 421 LNICST | en_US |
dc.institutionauthor | Koyuncu, Murat | |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST -- 7th EAI International Conference on the Internet of Things as a Service, IoTaaS 2021 -- 13 December 2021 through 14 December 2021 -- Sydney -- 280429 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.scopus.citedbyCount | 0 | |
dc.subject | Internet of Things | en_US |
dc.subject | IoT | en_US |
dc.subject | Security | en_US |
dc.subject | Security requirements | en_US |
dc.title | Security Requirements in Iot Environments | en_US |
dc.type | Conference Object | en_US |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 948643aa-7723-4c65-8da8-fcc884405cd1 | |
relation.isAuthorOfPublication.latestForDiscovery | 948643aa-7723-4c65-8da8-fcc884405cd1 | |
relation.isOrgUnitOfPublication | cf0fb36c-0500-438e-b4cc-ad1d4ef25579 | |
relation.isOrgUnitOfPublication.latestForDiscovery | cf0fb36c-0500-438e-b4cc-ad1d4ef25579 |