2020
DOI: 10.1016/j.jnca.2020.102763
|View full text |Cite
|
Sign up to set email alerts
|

A survey on technologies and security protocols: Reference for future generation IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(45 citation statements)
references
References 48 publications
0
31
0
Order By: Relevance
“…In addition, they only selected 131 articles for review. Most of the review studies not listed in Table 2 focused on specific areas of IoT security, such as layer protocols [33], intrusion detection [34], device security [35,36], trust [37], and security of specific IoT applications [38]. us, a systematic mapping study is still required to determine research topics and trends in IoT security and gain insights on this field.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…In addition, they only selected 131 articles for review. Most of the review studies not listed in Table 2 focused on specific areas of IoT security, such as layer protocols [33], intrusion detection [34], device security [35,36], trust [37], and security of specific IoT applications [38]. us, a systematic mapping study is still required to determine research topics and trends in IoT security and gain insights on this field.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…This section presents some solutions for fog computing from the specialized literature and the middleware system [ 11 , 12 ] used in the IoT and IIoT.…”
Section: Related Workmentioning
confidence: 99%
“…This development is critical and difficult to resolve as it involves addressing complex security issues. Yugha et al [13] conducted a study of the protocols and technologies related to the security in IoT systems to constitute a reference in the generation of future systems. Noura et al [14] elaborated a review of security problems in Lo-RaWAN networks, identifying problems and offering action protocols to mitigate the identified problems.…”
Section: Related Workmentioning
confidence: 99%