2021
DOI: 10.3991/ijim.v15i24.27333
|View full text |Cite
|
Sign up to set email alerts
|

IoT-based Application of Information Security Triad

Abstract: Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. Wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…However, this openness requires trust, which can be established by strong security properties of the underlying IoT infrastructure. Communication security is a crucial concern in the field of IoT-based SHM [15], which can typically be evaluated using the confidentiality, integrity, and availability (CIA) triad [40].…”
Section: Secure Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this openness requires trust, which can be established by strong security properties of the underlying IoT infrastructure. Communication security is a crucial concern in the field of IoT-based SHM [15], which can typically be evaluated using the confidentiality, integrity, and availability (CIA) triad [40].…”
Section: Secure Communicationmentioning
confidence: 99%
“…In general, a robust security concept that satisfies CIA depends on appropriate and comprehensive authentication and authorization methods, such as OpenID Connect [41] and access control [40]. They help systems to ensure that data are protected from unauthenticated and unauthorized access.…”
Section: Secure Communicationmentioning
confidence: 99%
“…Besides, side channel attack is conducted at the physical layer because attacker uses side channel information to find the encryption key [18]. At sensors, an attacker can manipulate data, can also do boot attacks, and can capture a node [19].…”
Section: ) Security Challenges and Problems Of Physical Layermentioning
confidence: 99%
“…In terms of the Internet of Things, it will be disastrous for the original owner if the attacker has access to the house data and can operate the house instead of them [3].…”
Section: Introductionmentioning
confidence: 99%