2022
DOI: 10.1109/tii.2022.3141408
|View full text |Cite
|
Sign up to set email alerts
|

Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 75 publications
0
16
0
Order By: Relevance
“…The main part of this project stage was to figure out ways to pick up sounds in general. The challenge of identifying various frightening sound occurrences may be broken down into two separate subtasks [34]:…”
Section: Model Overviewmentioning
confidence: 99%
“…The main part of this project stage was to figure out ways to pick up sounds in general. The challenge of identifying various frightening sound occurrences may be broken down into two separate subtasks [34]:…”
Section: Model Overviewmentioning
confidence: 99%
“…In the near future, vast number of things connected to the Internet will need an IPv6 address since the IPv4 address space will be effectively consumed [41]. Accordingly, IPv6 addressing is now desirable as it provides 2 128 unique addresses or approximately Presents a detailed review of the security-related challenges and sources of threat in the IoT applications Shapla Khanam et al [20] Presents an overview of IoT, its system architecture, enabling technologies, and discusses security challenges Bin Liao et al [21] Analyzes the security of IoT devices and provides the countermeasures in response to security problems and challenges by using mobile computing Salma et al [22] Presents the challenges of IoT security and the security requirements needed by IoT systems Vishal et al [23] Surveys the security, privacy and trust for Smart Mobile-Internet of Things Ismail et al [24] Presents a review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks Pawani et al [25] Surveys the security considerations with 6G enabling technologies Shalitha et al [26] Surveys the exploitation of Network Slicing for Internet of Things in 5G Networks Van-Linh Nguyen et al [27] Surveys the security and privacy issues based on prospective technologies for 6G Dinh C. Nguyen et al [28] Surveys wireless artificial intelligence applications in various data-driven domains Yasmine et al [29] Provides an up-to-date vision of the current research topics related to IoT security and propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers Pasika et al [30] Analyse the security and privacy of the Multi-Access Edge Computing system Zhiyuan Yu et al [31] Surveys the security and privacy problems arising from the interaction of cyber world and physical world, with the context of broad cyber-physical applications Euijong Lee et al [32] Surveys the international standards related to interoperability and security for IoT environments Xing et al [33] Provides an overview of IoT equipment's physical security and safety, antitheft and antivandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods Arup et al [34] Surveys the security and privacy threats for bluetooth low energy in IoT and wearable devices Lijun et al [35] Analyse various dimensions of trust, dynamic changes of context, privacy preserving, and cross-domain issues Jiani et al [36] Provides general security guidelines for IoT-enabled smart city developments, highlights common security challenges and reviews recent cryptographic security implementations for IoT-enabled smart cities Emilie et al…”
Section: Iot Ecosystemmentioning
confidence: 99%
“…As seen in the vulnerabilities section earlier, there are various weaknesses that can be potentially exploited when it comes to edge nodes/devices that are responsible for interacting with the physical environment and the system [57], [85]. The first step to prevent cyber-attacks in the perception layer is to design the IIoT systems physically secure.…”
Section: ) Edge Protectionmentioning
confidence: 99%