2022
DOI: 10.17762/ijcnis.v11i3.4272
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Evolution: Challenges and Countermeasures Review

Abstract: Internet of Things (IoT) architecture, technologies, applications and security have been recently addressed by a number of researchers. Basically, IoT adds internet connectivity to a system of intelligent devices, machines, objects and/or people. Devices are allowed to automatically collect and transmit data over the Internet, which exposes them to serious attacks and threats. This paper provides an intensive review of IoT evolution with primary focusing on security issues together with the proposed countermea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Authentication has achieved a great consideration within IoT security [7]. Authentication is important to check the validity of devices before sharing information with each other [8].…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…Authentication has achieved a great consideration within IoT security [7]. Authentication is important to check the validity of devices before sharing information with each other [8].…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…After that, these models can independently recognize patterns and abnormalities suggestive of C&C threats in real-time, adding another layer of security for IoT networks (Atzori et al, 2010). IoT devices' often restricted computational resources, such as little memory and processing power, are one of their distinguishing characteristics (Abuagoub, 2022). Implementing effective security measures is made more difficult by these resource constraints.…”
Section: Introductionmentioning
confidence: 99%
“…To deal with false-position security threats, digital signature and plausibility checks are used in a vehicle-to-vehicle secure position-based routing protocol [21], [22]. Hash message authentication code (HMAC) is integrated with the optimized link state routing (OLSR) to generate the secure OLSR (SOLSR) routing protocol [23], [24]. The protocol detects the snooping security threats through the use of symmetric and public cryptographic key.…”
Section: Introductionmentioning
confidence: 99%