2022
DOI: 10.1007/s11277-021-09420-0
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(21 citation statements)
references
References 93 publications
0
15
0
Order By: Relevance
“…Together with the challenges confronted by the Internet, IoT faces substantial challenges (including scalability, mobility, and resource limitations) due to a mas-sive number of interconnected devices, and heterogeneity of exchanged data [37]. Researchers and practitioners have delved into various OSI layers to scrutinize security concerns within the IoT software development process, a crucial aspect of the DevSecOps pipeline.…”
Section: Related Workmentioning
confidence: 99%
“…Together with the challenges confronted by the Internet, IoT faces substantial challenges (including scalability, mobility, and resource limitations) due to a mas-sive number of interconnected devices, and heterogeneity of exchanged data [37]. Researchers and practitioners have delved into various OSI layers to scrutinize security concerns within the IoT software development process, a crucial aspect of the DevSecOps pipeline.…”
Section: Related Workmentioning
confidence: 99%
“…We have reviewed and analyzed several papers related to IoT security, especially application layer security [8] [6] [23] [56] [71] [85] [95], etc. However, in all of these papers, there is no thorough framework that guarantees security and/or privacy in IoT for a wide range of use cases.…”
Section: A the Lack Of Comprehensive Security-and/or Privacy-protecti...mentioning
confidence: 99%
“…Due to the fact that these systems are increasingly used in diverse aspects, fundamental questions bring up about the security of such systems. Many investigations have provided proof of security and privacy vulnerabilities such as authentication, authorization, Denial-of-Service (DoS) attacks, and information leakage in IoT-powered systems [7], [8], [9]. Indeed, not only the number of IoT security threats is growing, but also their complexity [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As smart applications collect sensitive data, it is important to consider security and privacy issues at different levels of the architecture while designing and implementing these applications [8]. One of these security concerns is securing data transmission between IoT devices by ensuring confidentiality, authentication, and integrity in data routing [9]- [11].…”
Section: Introductionmentioning
confidence: 99%