Selected Articles from IEEE Xplore - March 2015

There are many examples of how IoT technologies can improve our lives, but along with those benefits bring the real responsibility of securing the systems which have now incorporated a huge amount of data and the ability to control systems across the internet.

This month, we selected IEEE Xplore articles which explore the use of IoT technologies in security systems.


IEEE Xplore References

  1. T. Xu, J. B. Wendt and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, 2014, pp. 417-423.
  2. C. Liu, Y. Zhang and H. Zhang, "A Novel Approach to IoT Security Based on Immunology," Computational Intelligence and Security (CIS), 2013 9th International Conference on, Leshan, 2013, pp. 771-775.
  3. H. C. Pöhls et al., "RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects," Wireless Communications and Networking Conference Workshops (WCNCW), 2014 IEEE, Istanbul, 2014, pp. 122-127.
  4. M. Abomhara and G. M. Køien, "Security and privacy in the Internet of Things: Current status and open issues," Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, Aalborg, 2014, pp. 1-8.


Subscribe to the IEEE Internet of Things Technical Community to receive complimentary access to our selected articles each month via email.


View more Selected Articles from IEEE Xplore