Reference : Advancing the Security of Trustworthy Self-IoT (Position Paper) |
Scientific congresses, symposiums and conference proceedings : Paper published in a book | |||
Engineering, computing & technology : Computer science | |||
Security, Reliability and Trust | |||
http://hdl.handle.net/10993/37042 | |||
Advancing the Security of Trustworthy Self-IoT (Position Paper) | |
English | |
Msadek, Mohamed Nizar ![]() | |
Soua, Ridha ![]() | |
Ladid, Latif ![]() | |
Engel, Thomas ![]() | |
Nov-2018 | |
International Conference on Smart Applications, Communications and Networking (SmartNets) | |
Yes | |
No | |
International | |
International Conference on Smart Applications, Communications and Networking (SmartNets) | |
from 16-11-2018 to 17-11-2018 | |
Hammamet | |
Tunisia | |
[en] Internet of Things; Autonomous Systems; Security; Self-IoT; Trustworthy Computing | |
[en] The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently
to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. | |
Researchers ; General public | |
http://hdl.handle.net/10993/37042 |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.