2021
DOI: 10.1080/09720529.2021.1957189
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things security threats and key technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…IoT is, in a major way, supportive of adopting sustainable development practices (Makori, 2017). The major limitations of IoT are linked to resource scarcity, privacy and security (Fadhil, 2021; Goumagias et al , 2021; Maple, 2017). Research on IoT, by and large, focuses on the following dimensions: frameworks and challenges of IoT; current situation of IoT in different applications; interactions of IoT; security issues of IoT; application domains of IoT; data management of IoT; IoT in product lifecycle management; enabling technologies of IoT; IoT in smart cities; and IoT in recommender systems (Ng et al , 2018; Himeur et al , 2022).…”
Section: Basic Conceptsmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT is, in a major way, supportive of adopting sustainable development practices (Makori, 2017). The major limitations of IoT are linked to resource scarcity, privacy and security (Fadhil, 2021; Goumagias et al , 2021; Maple, 2017). Research on IoT, by and large, focuses on the following dimensions: frameworks and challenges of IoT; current situation of IoT in different applications; interactions of IoT; security issues of IoT; application domains of IoT; data management of IoT; IoT in product lifecycle management; enabling technologies of IoT; IoT in smart cities; and IoT in recommender systems (Ng et al , 2018; Himeur et al , 2022).…”
Section: Basic Conceptsmentioning
confidence: 99%
“…IoT is, in a major way, supportive of adopting sustainable development practices (Makori, 2017). The major limitations of IoT are linked to resource scarcity, privacy and security (Fadhil, 2021;Goumagias et al, 2021;Maple, 2017) IoT in recommender systems (Ng et al, 2018;Himeur et al, 2022).…”
Section: Brief About Internet Of Thingsmentioning
confidence: 99%
“…Ahmad et al [21] elaborated on the different types of security attacks in relation to the different layers of IoT, including physical attacks, software attacks, network attacks, and encryption attacks. There was also a presentation of some IoT applications such as Smart Homes, Smart Cities, Smart Grids, Health Sector, and Security & Emergencies.…”
Section: Threats In Iotmentioning
confidence: 99%
“…The authentication model that is applied to restrict the IoT device's access can take different approaches to verify the user's identity, these approaches are classified as [8], One-time-password authentication (OTP), ID-based authentication, and user's certificate authentication, and each class involved several researchers methods [2,4,9]. The motives of this paper, are to establish a reliable and lightweight authentication model, so emphasizing various research works that employed the ECC to introduce the IoT authentication model.…”
Section: Related Workmentioning
confidence: 99%
“…At first glance, this seems like a tradeoff between performance and security ability, therefore, the main challenge [8] in a limited-environment platform, such as IoT, is how to consider the appropriate features in any security mechanism. Many lightweight authentication methods are used for established better key agreements such as password authentication, biometrics authentication, digital signature algorithms, and so on.…”
Section: Introductionmentioning
confidence: 99%