Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications 2020
DOI: 10.1002/9781119670087.ch14
|View full text |Cite
|
Sign up to set email alerts
|

Security Attacks in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…To mitigate these attacks, the devices should be designed such that they are physically secure in nature [37]. This includes the secure design of the data acquisition unit, radio frequency circuits, and chip selection.…”
Section: A Physical Layermentioning
confidence: 99%
“…To mitigate these attacks, the devices should be designed such that they are physically secure in nature [37]. This includes the secure design of the data acquisition unit, radio frequency circuits, and chip selection.…”
Section: A Physical Layermentioning
confidence: 99%
“…As a result, the authentication must be contained within the devices, with the ability to change the credentials as needed. Cryptography primitives: The IoT systems involve crucial phenomena such as encrypting data that is shared with a private key among users and unlocking the data using advanced computer techniques. The data transmitted by IoT devices is subject to assaults, which might occur between devices, via the internet, or in the cloud 23 . To guarantee safe and secure data transport, IoT devices must include industry compliant standard encryption libraries.…”
Section: Challenges Of Iot Device Securitymentioning
confidence: 99%