2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) 2022
DOI: 10.1109/icscds53736.2022.9760927
|View full text |Cite
|
Sign up to set email alerts
|

Recent Privacy and Security Issues in Internet of Things Network Layer: A Systematic Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Then, it would be desirable to be able to connect UAVs with these systems and provide information to farmers in real time. As the IoT advances, security issues are a concern, so it will be important to develop autonomous decentralized systems that increase data tamper resistance using blockchain technology [33], [34], [35], [36].…”
Section: Discussionmentioning
confidence: 99%
“…Then, it would be desirable to be able to connect UAVs with these systems and provide information to farmers in real time. As the IoT advances, security issues are a concern, so it will be important to develop autonomous decentralized systems that increase data tamper resistance using blockchain technology [33], [34], [35], [36].…”
Section: Discussionmentioning
confidence: 99%
“…The decision provider is the e-commerce food chain seller [34], particularly its supply chain and management of warehouses, which must nurture and support the usage of Blockchain-based technology.…”
Section: G Case Studymentioning
confidence: 99%
“…Since technologies related to the Internet of Things (IoT) have been increasingly used in smart cities and homes, applications related to agriculture and fisheries, water quality monitoring, power monitoring, road monitoring, and other applications have expanded exponentially [1]. However, the IoT primarily uses HTTPS or MQTTS for information transmission, and the transmission process meets information security requirements [2], most of which import HTTPS data encryption for basic data protection.…”
Section: Introductionmentioning
confidence: 99%