2022
DOI: 10.3390/app12031598
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in the Internet of Things in Industrial Management

Abstract: Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 63 publications
(30 citation statements)
references
References 62 publications
0
29
0
1
Order By: Relevance
“…Therefore, the LRSB involves the screening and selection of information sources to ensure the validity and accuracy of the data presented, in a process consisting of 3 phases and 6 steps [24,25,[28][29][30] (Table 1).…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, the LRSB involves the screening and selection of information sources to ensure the validity and accuracy of the data presented, in a process consisting of 3 phases and 6 steps [24,25,[28][29][30] (Table 1).…”
Section: Methodsmentioning
confidence: 99%
“…Therefore, the LRSB involves the screening and selection of information sources to ensure the validity and accuracy of the data presented, in a process consisting of 3 phases and 6 steps [9,10,13,14,15] (Table 1).…”
Section: Methodsmentioning
confidence: 99%
“…This security layer is applied to the lightweight MQTT protocol (MQTTS), together with password authentication, to send the data of the hybrid inverters to the main communication server. This solution cannot be seen as definitive, as research related to cybersecurity is advancing, mainly towards blockchain and the use of a well-structured sensor network [49].…”
Section: Communication Server and Database Servermentioning
confidence: 99%