2021
DOI: 10.1109/jiot.2020.3041049
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements and Solutions for IoT Gateways: A Comprehensive Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Furthermore, edge computing allows for real-time processing of data enabling quick decision-making and reducing the risk of downtime levels. Quality of Service (QoS) mechanisms [ [36] , [37] , [38] , [39] ]: QoS mechanisms, such as traffic shaping and prioritization, can be used to allocate network resources via Secure Many-to-Many Authentication and Key Agreement (SMAA) in a way that ensures high-quality service delivery levels [ [40] , [41] , [42] ]. By prioritizing critical data traffic over non-critical traffic, QoS mechanisms can reduce network congestion and ensure reliable delivery of critical datasets & samples [ 43 , 44 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, edge computing allows for real-time processing of data enabling quick decision-making and reducing the risk of downtime levels. Quality of Service (QoS) mechanisms [ [36] , [37] , [38] , [39] ]: QoS mechanisms, such as traffic shaping and prioritization, can be used to allocate network resources via Secure Many-to-Many Authentication and Key Agreement (SMAA) in a way that ensures high-quality service delivery levels [ [40] , [41] , [42] ]. By prioritizing critical data traffic over non-critical traffic, QoS mechanisms can reduce network congestion and ensure reliable delivery of critical datasets & samples [ 43 , 44 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This leads to real challenges regarding IoT applications in terms of privacy and security. Indeed, attackers can illegally access and hijack the system or steal data through the security vulnerabilities of IoT devices [60], operating systems [61], Internet gateways [62], remote computing servers [63], or denial of service (DDOS) attacks [64]. In the smart IoHT domain, medical data records play a particularly crucial role and are sensitive [65].…”
Section: Blockchainmentioning
confidence: 99%
“…Many scientists have researched this phenomenon (Security issues in IoT). There are three main protection tools for smart gateways as described below [47]:…”
Section: Security Issues For Iot Gateways and Solutionsmentioning
confidence: 99%