Affiliation:
1. Division of Information Technology, Netaji Subhas University of Technology, New Delhi, India
Abstract
Internet of Things(IoT) is a technical revolution of the internet where users, computing systems, and daily objects having sensing abilities, collaborate to provide innovative services in several application domains. Opportunistic IoT(OppIoT)is an extension of the opportunistic networks that exploits the interactions between the human-based communities and the IoT devices to increase the network connectivity and reliability. In this context, the security and privacy requirements play a crucial role as the collected information is exposed to a wide unknown audience. An adaptable infrastructure is required to handle the intrinsic vulnerabilities of OppIoT devices, with limited resources and heterogeneous technologies. This chapter elaborates the security requirements, the possible threats, and the current work conducted in the field of security in OppIoT networks.
Reference39 articles.
1. Adjih, C., Raffo, D., & Muhlethaler, P. (2005). Attacks against olsr: Distributed key management for security. 2nd OLSR Interop/Workshop, Palaiseau, France, 14, pp. 1-5.
2. Secure routing for internet of things: A survey
3. Secure opportunistic large array for Internet of Things
4. The Internet of Things: A survey
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献