2023
DOI: 10.1002/spy2.318
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study on cybersecurity challenges and opportunities in the IoT world

Abstract: It has become possible to link anything and everything to the Internet in recent decades due to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a lot, causing digital disruption in the real world. IoT allows drones, sensors, digital set‐top boxes, surveillance cameras, wearable technology, and medical equipment to be connected to the internet. Healthcare, manufacturing, utilities, transportation, and housing are among the various sectors that has become intelligent. Rec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(4 citation statements)
references
References 136 publications
0
4
0
Order By: Relevance
“…While IoT offers immense benefits in terms of efficiency and automation, it also brings forth intricate cybersecurity challenges [2]. The interconnectivity and heterogeneity of IoT devices exposes these networks to sophisticated cyber threats, demanding robust defined mechanisms to safeguard sensitive data and preserve operational continuity [3].…”
Section: Introductionmentioning
confidence: 99%
“…While IoT offers immense benefits in terms of efficiency and automation, it also brings forth intricate cybersecurity challenges [2]. The interconnectivity and heterogeneity of IoT devices exposes these networks to sophisticated cyber threats, demanding robust defined mechanisms to safeguard sensitive data and preserve operational continuity [3].…”
Section: Introductionmentioning
confidence: 99%
“…Cloud computing resource scheduling and IoT security have made great progress through continuous development [1]. Many studies focus on cloud computing scheduling, including algorithms based on deep reinforcement learning [2], system security [3], ordinal optimization [4], and multi-objective trustawareness [5].…”
Section: Introductionmentioning
confidence: 99%
“…The properties of the attributes frequently have an influence on SDP model efficiency (Tanwar and Kakkar, 2019). The author (Lone et al, 2023), has used AI and machine learning techniques for security emerging computing and software. The final establishment of an accepted set of characteristics for predicting defects has not yet taken place.…”
Section: Introductionmentioning
confidence: 99%