End-to-End Trust and Security for Internet of Things Applications
Document Type
Article
Publication Date
4-2018
Abstract
Many Internet of Things (IoT) devices utilize the cloud to store data and synchronize with one another. Because data breaches can occur anywhere en route to the cloud, ensuring end-to-end trust and security for IoT applications is critical. The authors propose a novel 3D threat model for the IoT and discuss nine security and privacy challenges as well as several ways to mitigate risks.
Recommended Citation
Bhattarai, Sulabh and Wang, Yong, "End-to-End Trust and Security for Internet of Things Applications" (2018). Research & Publications. 7.
https://scholar.dsu.edu/ccspapers/7