Table of contents
-
1. Introduction
-
2. Background
-
3. Issues in IoT Devices
-
3.1. Vulnerabilities in IoT Devices
-
3.2. RFID and WSN Security
-
-
4. Centralized vs Distributed IoT
-
4.1. Centralized IoT
-
4.2. Distributed IoT
-
4.3. Security and Privacy issues
-
-
5. IoT Network Security
-
6. IoT Applications Security
-
7. Views of IoT stakeholders
-
8. Conclusion
-
9. References