2023
DOI: 10.1016/j.iotcps.2022.12.003
|View full text |Cite
|
Sign up to set email alerts
|

IoT: Communication protocols and security threats

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(22 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…Another works [35,4,78,44,125] predominantly focus on communication protocols and security in IoT. Gerodimos et al [35] discuss the fundamentals of IoT architecture and present an analysis of security threats.…”
Section: Related Iot Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…Another works [35,4,78,44,125] predominantly focus on communication protocols and security in IoT. Gerodimos et al [35] discuss the fundamentals of IoT architecture and present an analysis of security threats.…”
Section: Related Iot Surveysmentioning
confidence: 99%
“…Another works [35,4,78,44,125] predominantly focus on communication protocols and security in IoT. Gerodimos et al [35] discuss the fundamentals of IoT architecture and present an analysis of security threats. Abbasi [4] et al and Nebbione and Calzarossa [78] delve deep into security requirements, threats, and countermeasures in the IoT application layer.…”
Section: Related Iot Surveysmentioning
confidence: 99%
“…Robust security measures are integrated to fortify the integrity and confidentiality of processed data. This includes implementation of TLS/SSL for secure data transmission, access-control mechanisms, and intrusion detection systems [108]. Compliance with industry standards such as ISO/IEC 27001 and GDPR is ensured through continuous security audits using tools like Nessus.…”
Section: Server Setupmentioning
confidence: 99%
“…In this paper, the secured communication protocols have been studied to improve the detection rate of the proposed IDS. The protocols analyzed have been listed in list [57]. These protocols have also been used in a wide range of applications as well.…”
Section: ) Communication Protocolsmentioning
confidence: 99%
“…A probabilistic model governs each intrusion at the IoT node. The proposed IDS needs to align with the probabilistic model of successful attacks explained in section III-D3b [57]. While quantum vulnerabilities are beyond the scope of this paper, it's important to note that the advent of quantum computing presents new challenges in cybersecurity.…”
Section: A: Common Security Vulnerabilitiesmentioning
confidence: 99%