Issue No. 04 - April (2018 vol. 51)
Sulabh Bhattarai , Dakota State University
Yong Wang , Dakota State University
Many Internet of Things (IoT) devices utilize the cloud to store data and synchronize with one another. Because data breaches can occur anywhere en route to the cloud, ensuring end-to-end trust and security for IoT applications is critical. The authors propose a novel 3D threat model for the IoT and discuss nine security and privacy challenges as well as several ways to mitigate risks.
Computer security, Cloud computing, Internet of Things, Microprogramming, Computer architecture, Logic gates, Synchronization
S. Bhattarai and Y. Wang, "End-to-End Trust and Security for Internet of Things Applications," in Computer, vol. 51, no. 4, pp. 20-27, 2018.