2019
DOI: 10.1109/access.2019.2924045
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Abstract: The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
628
0
13

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 1,078 publications
(642 citation statements)
references
References 165 publications
1
628
0
13
Order By: Relevance
“…Most of the botnets launched the DDoS attacks to disrupt a service, and to make it unavailable to legitimate users [6]. DDoS attacks can occur in both the network layer and the application layer in the IoT environment [9]. Data theft and privacy issues are the specific security issues in the application layer of the IoT environment [9].…”
Section: Common Attacks In the Iot Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the botnets launched the DDoS attacks to disrupt a service, and to make it unavailable to legitimate users [6]. DDoS attacks can occur in both the network layer and the application layer in the IoT environment [9]. Data theft and privacy issues are the specific security issues in the application layer of the IoT environment [9].…”
Section: Common Attacks In the Iot Environmentmentioning
confidence: 99%
“…DDoS attacks can occur in both the network layer and the application layer in the IoT environment [9]. Data theft and privacy issues are the specific security issues in the application layer of the IoT environment [9]. The study [10] addressed the challenges of data disclosure and privacy violations to the users.…”
Section: Common Attacks In the Iot Environmentmentioning
confidence: 99%
“…Let C be the cipher text space consisting of symbols that are different from the one defined in M. The encryption mechanism is a bijective function, denoted by Ee, between M and C, which can be uniquely determined by an element {e ∈ K}, where K is the key space. Likewise, the decryption mechanism that can be defined as a Security in IoT is still a factor of concern and boundless applications of the IoT technology portend a wide range of security challenges [9,10]. Unauthorized access and data manipulation have become common threats in these networks.…”
Section: Security Preliminariesmentioning
confidence: 99%
“…However, changes are made so that the sum of ( ), = 1,2,3 is always constant and equal to one. The increase or decrease the probability of different conditions in LA with fixed structure as equation (5).…”
Section: -3-1 Reinforcement Signalmentioning
confidence: 99%
“…By increasing the number of selfish nodes, the average end-to-end delay is increased in the data packets and network traffic. It is generally impaired by network functionality and practicality [5][6][7]. To overcome the effects of selfish nodes, identifying and dealing with them is of particular importance.…”
Section: -Introductionmentioning
confidence: 99%