Journals
Publish with us
Publishing partnerships
About us
Blog
Journal of Computer Networks and Communications
+
Journal Menu
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Submit
Journal of Computer Networks and Communications
/
2019
/
Article
/
Tab 1
Review Article
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
Table 1
Comparison of challenges and open/future issues for different security requirements in IoT network.
Security requirements
Challenges
Open issues and future directions
Profiling and tracking
Comprehensive privacy-preserving frameworks
Privacy
Localization
Context-aware privacy policies
Secure data transmission
Game theory based privacy-preserving incentives
Network virtualization and SDNs
Confidentiality
Lightweight primitives
Efficient holistic frameworks
Consume low resource
Utilization of SDNs for lightweight security provisioning
Secure routing
Secure route establishment
IoT network performance focused routing protocol design
Isolation of malicious nodes
Effective and fine grained control over routing activities leveraging SDN
Self-stabilization of the security protocol
Preservation of location privacy
Robust and resilient management
Attack tolerance
SDN-based centralized management frameworks
Early detection of attacks
Quick recovery from failures
Attack detection (DDOS and insider)
Resource efficient DoS attack detection
Lightweight solution for resource constraint device
Resource efficient countermeasures
Centralized SDN detection and mitigation algorithms
Resource efficient insider attack detection