2020
DOI: 10.3390/iot1020016
|View full text |Cite
|
Sign up to set email alerts
|

IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework

Abstract: The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical world. Driven by the IoT, with each passing day, the Internet becomes more integrated with everyday life. While IoT devices provide endless new capabilities and make life more convenient, they also vastly increase the opportunity for nefarious individuals, criminal organizations and even state actors to spy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
31
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 66 publications
(34 citation statements)
references
References 19 publications
(20 reference statements)
1
31
0
2
Order By: Relevance
“…In our opinion, the regulatory role of the state in the field of artificial intelligence is very important since, in the pursuit of profit, companies can ignore aspects of security, including the future one. This, in particular, is stated in [14].…”
Section: Discussionmentioning
confidence: 88%
“…In our opinion, the regulatory role of the state in the field of artificial intelligence is very important since, in the pursuit of profit, companies can ignore aspects of security, including the future one. This, in particular, is stated in [14].…”
Section: Discussionmentioning
confidence: 88%
“…These indicators will be severely affected by the pressure of the medium and the external environment in practical applications, resulting in inaccurate results. Wheelus & Zhu (2019) [35] discussed the security issues of the IoT. They first analyzed the threats and risks of the IoT based on the Cisco Seven-Layer IoT Reference Model and the Information Assurance and Security (IAS) Octave.…”
Section: ) Applications Of Iot and Blockchainmentioning
confidence: 99%
“…The network layer as the intermediary layer is the collection of all hardware and protocols that comprise all network communications, including switching and routing, protocols and translation between them, network-level security, and all to ensure the reliability of the network that takes place in the IoT system [16], data collected from physical layer devices need to be transferred and processed, that's where the network layer involves in linking these devices and transfer data to other smart objects, such as servers and network devices through the intermediary. The intermediary portal is typically an internet gateway located at the edge of the connected devices, sometimes containing a proxy server.…”
Section: Network Layermentioning
confidence: 99%