2020
DOI: 10.1109/comst.2019.2953364
|View full text |Cite
|
Sign up to set email alerts
|

Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
271
0
5

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 517 publications
(277 citation statements)
references
References 149 publications
1
271
0
5
Order By: Relevance
“…Usage of PUFs promises an increase in the security level of the IoT, by enabling low-level security implementations on the things and also by devising cryptography algorithms to perform special tasks (e.g., verification, etc.) [ 67 ]. In a similar fashion, fog computing can leverage PUFs that are embedded to the fog gateways and/or IoT end-devices, in order to ensure IP protection during patch updates.…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%
“…Usage of PUFs promises an increase in the security level of the IoT, by enabling low-level security implementations on the things and also by devising cryptography algorithms to perform special tasks (e.g., verification, etc.) [ 67 ]. In a similar fashion, fog computing can leverage PUFs that are embedded to the fog gateways and/or IoT end-devices, in order to ensure IP protection during patch updates.…”
Section: Hardware Assisted Security Of Fog Computing Devicesmentioning
confidence: 99%
“…IoMT devices may pose a threat to users due to susceptibility to hacking. Although there is currently some attention on the issue of security for the IoMT systems [138][139][140], there is no common standard, protocol, or security framework for IoMT devices. Therefore, addressing security issues for IoMT is now an urgent concern in our research work; Management: Selecting the right type of IoMT device to support a specific anticipatory task is not an easy choice.…”
Section: Research Challengesmentioning
confidence: 99%
“…The IoT enables the connection of a very large-scale quantity of devices, users and their associated services and applications, enabling them to interact with one another. While this improves the users’ experience, it also poses multiple security issues [ 26 , 27 , 28 ]. Numerous proposals to address the security issues of the IoT have been advanced and address areas such as access control, privacy, trust, identity, etc.…”
Section: Introductionmentioning
confidence: 99%