2022
DOI: 10.3390/electronics11152354
|View full text |Cite
|
Sign up to set email alerts
|

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Abstract: The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology. Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors. Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 73 publications
(12 citation statements)
references
References 39 publications
(47 reference statements)
0
12
0
Order By: Relevance
“…The smart home automation system is used with the help of internet of things which is especially attached with sensors which can easily control cloud research laboratories. The IoT cloud technology may occur with the potential resources such as codes and high protective key codes which cannot form fraud activities [23]. The digital database is used for helping institutional and professional effects that help in superior specification of communities.…”
Section: Application Of Language Processing and Iot Cloud In Smart Homementioning
confidence: 99%
“…The smart home automation system is used with the help of internet of things which is especially attached with sensors which can easily control cloud research laboratories. The IoT cloud technology may occur with the potential resources such as codes and high protective key codes which cannot form fraud activities [23]. The digital database is used for helping institutional and professional effects that help in superior specification of communities.…”
Section: Application Of Language Processing and Iot Cloud In Smart Homementioning
confidence: 99%
“…Users of IoT devices often deploy it without having any sort of knowledge regarding the IT department and this can make a huge impact on the security protocols of IoT devices [7]. This lack of knowledge makes it impossible to have an adequate stock of what requires be securing and observing firmly.…”
Section: Deficiency Of Visibilitymentioning
confidence: 99%
“…Conventional security systems use smart cards, passwords, pin codes. Biometrics provides high level prominence, by removing possible problems around stolen authorizations [6]. The usage of functions such as eyeball scans, fingerprints make sure genuine recognition which cannot be copied easily.…”
Section: Correct Identificationmentioning
confidence: 99%