2023
DOI: 10.9734/ajrcos/2023/v16i4397
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security in the Era of Ubiquitous Computing: A Multidisciplinary Approach to Addressing Vulnerabilities and Promoting Resilience

Oluwaseun Oladeji Olaniyi,
Olalekan Jamiu Okunleye,
Samuel Oladiipo Olabanji
et al.

Abstract: The Internet of Things (IoT) has rapidly become a pivotal, transformative force, seamlessly integrating billions of physical devices through sophisticated networks of embedded sensors, software, and internet connectivity. This expansive and interconnected ecosystem offers a broad spectrum of applications, significantly benefiting urban infrastructure with innovative solutions, enhancing industrial operations through optimization, and enriching consumer experiences with smart devices for safety and convenience.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…The assessment was conducted on the Raspberry Pi Cluster with Kubernetes, and the associated environmental monitoring solution was performed by OpenVAS, which aimed to identify potential vulnerabilities and weaknesses within the environment. This process is essential for proactively enhancing the system's security posture and preventing potential security breaches [32].…”
Section: Vulnerability Scanning and Assessmentmentioning
confidence: 99%
“…The assessment was conducted on the Raspberry Pi Cluster with Kubernetes, and the associated environmental monitoring solution was performed by OpenVAS, which aimed to identify potential vulnerabilities and weaknesses within the environment. This process is essential for proactively enhancing the system's security posture and preventing potential security breaches [32].…”
Section: Vulnerability Scanning and Assessmentmentioning
confidence: 99%
“…However, caution is advised, with suggestions that a modest allocation to crypto, such as 5% of an alternative investment portfolio, might be reasonable and prudent [87,93]. Financial planners must develop a comprehensive understanding of risk tolerance, stay abreast of regulatory changes, and effectively utilize technological advancements to ensure the stability and security of retirement investments [94,95]. This approach is not only about managing financial assets but also about building trust and confidence among clients in the face of new investment frontiers like cryptocurrencies [95].…”
Section: Platforms Like Robinhoodmentioning
confidence: 99%
“…The evolution of drone technology, especially with the integration of artificial intelligence, has further enhanced its capabilities. AI-driven drones can autonomously execute tasks, enabling terrorists to carry out complex, large-scale attacks covertly and efficiently [67,68].…”
Section: Dronesmentioning
confidence: 99%