Wiley 5G Ref 2019
DOI: 10.1002/9781119471509.w5gref260
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to IoT Security

Abstract: In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart‐everything, the Internet of Things (IoT) security plays a central role with no margin for error or shortage on supply. Securing, including authentication of these devices, will become everyone's priority, from manufacturers to silicon vendors (or IP developers), to software and application developers, and to the final consumer,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 65 publications
0
9
0
Order By: Relevance
“…Confidentiality is the act of preventing unauthorized entities from reading or accessing sensitive materials [48]. This aspect of security obscures information by encrypting the payload with a considerable level of cryptography.…”
Section: A Confidentialitymentioning
confidence: 99%
“…Confidentiality is the act of preventing unauthorized entities from reading or accessing sensitive materials [48]. This aspect of security obscures information by encrypting the payload with a considerable level of cryptography.…”
Section: A Confidentialitymentioning
confidence: 99%
“…However, the development of IoT technologies is still in transition and has not fully matured in terms of security protection. The IoT systems have several security challenges [ 16 ], such as non-uniform manufacturing standards and update management problems caused by IoT software developers. Physical handling of the security issues and users’ ignorance due to their lack of awareness of security problems associated with the IoT systems are also critical problems.…”
Section: Iot System and Security Issuesmentioning
confidence: 99%
“…Unfortunately, traditional network security systems are not applicable in IoT systems due to the nature of the resource constraints. Furthermore, different network attacks have also emerged due to the rapid development and wide application of the IoT system applications [ 16 , 37 ]. The amount of attacks will continue to rise as the IoT use cases expands.…”
Section: Iot System and Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…In cryptography, the terminology of a weak key refers to the key phrase that is used with a specific cryptographic Ransomware A malware once installed to a system demands a ransom (typically financial) from the owner Denied access to a part or entire system or threatens to publish sensitive information until the ransom is settled [102,135] Man-in-the-middle (MitM) Attempting to access the traversing information of a communication link in between the sender and the receiver Revealing the information and protocol, injecting false/malicious content [31,73] Side-channel attack (SCA) Analyses a physical property of a device via tampering Information, keys, or even a protocol could be revealed [75,154] algorithm or a cipher that is exposed with brute force (exhaustive key search), or guessing. Weak keys usually represent a tiny fraction of the overall keyspace, the set of the whole possible permutations of a key.…”
Section: Vulnerabilities In Iot Systemsmentioning
confidence: 99%