2023
DOI: 10.1007/s11227-023-05616-2
|View full text |Cite
|
Sign up to set email alerts
|

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

Sarra Cherbal,
Abdelhak Zier,
Sara Hebal
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 127 publications
0
4
0
Order By: Relevance
“…Because security is so important to the adoption of any new technology, it is a perceptual issue for researchers working in the Internet of Things. To handle a specific scenario of protecting an IoT network, a great deal of research has been done focusing on the degree of security available on a certain mechanism, on particular applications, or on classifying vulnerabilities [20].…”
Section: Literature Surveymentioning
confidence: 99%
“…Because security is so important to the adoption of any new technology, it is a perceptual issue for researchers working in the Internet of Things. To handle a specific scenario of protecting an IoT network, a great deal of research has been done focusing on the degree of security available on a certain mechanism, on particular applications, or on classifying vulnerabilities [20].…”
Section: Literature Surveymentioning
confidence: 99%
“…• Differential and Linear Cryptanalysis: These are analytical techniques that aim to discover patterns or relationships between the plaintext, ciphertext, and key. Attackers look for specific differentials or linear equations that may reveal key bits or reduce the security of the encryption (20,21) . • Side-Channel Attacks: These attacks exploit information that is inadvertently leaked during the cryptographic operation, such as power consumption, electromagnetic radiation, or timing.…”
Section: Attack Resistance Analysis Using Avalanche Effectmentioning
confidence: 99%
“…A more recent study [34], examined the challenges and strategies related to cloud computing and IoT security. Using blockchain, machine learning, cryptography, and quantum computing as examples, authors in [35] reviewed potential solutions for securing IoT by comparative analysis of the related papers. Then, they classified the relevant solutions based on their stated requirements for security.…”
Section: Inclusionmentioning
confidence: 99%
“…[34] Major difficulties with cloud computing, IoT, and Cloud-IoT security and strategies are discussed. [35] Emerging and traditional approaches to IoT security are discussed, including blockchain, machine learning, cryptography, and quantum computing. [36] Several articles are reviewed and various attacks and security challenges are discussed, including blockchain-based approaches.…”
Section: Inclusionmentioning
confidence: 99%