2021
DOI: 10.1155/2021/5579148
|View full text |Cite
|
Sign up to set email alerts
|

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Abstract: Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(8 citation statements)
references
References 221 publications
(312 reference statements)
1
7
0
Order By: Relevance
“…S. Rani et al (2021) explored the concept of Internet security in the light of existing cyber threats. So, the main problems can be unauthorized access, low level of data confidentiality, device vulnerability in software, DDoS attacks.…”
Section: Foreign Experience In the Field Of Cybercrime Investigation:...mentioning
confidence: 99%
“…S. Rani et al (2021) explored the concept of Internet security in the light of existing cyber threats. So, the main problems can be unauthorized access, low level of data confidentiality, device vulnerability in software, DDoS attacks.…”
Section: Foreign Experience In the Field Of Cybercrime Investigation:...mentioning
confidence: 99%
“…As the prevalence of key loggers has increased, numerous new attachment mechanisms have evolved. The report's author said that defending key human and commercial systems demands the most up-to-date knowledge of cyber security's threats and weaknesses (Rani et al, 2021). There are numerous open and hidden sources of information regarding these threats, including the National Vulnerability Database, CERT alerts, blog posts, social media, and black websites.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Users have little control over the setup or functionality of the gadgets they employ. It is well-known that only a small number of individuals possess the skills necessary to efficiently control or manage cyber warfare (Rani et al, 2021). The cyber realm is too enormous to be mastered by a single person or organization, even if they devote their entire life and acquire unfathomable amounts of specialized knowledge.…”
Section: Introductionmentioning
confidence: 99%
“…Statista.com estimated that the sum of IoT-connected devices will be 30.9 billion units worldwide by 2025 (Statista, 2021). These devices are heterogeneous having different manufacturers, protocols, specifications, and command interfaces with no existing standard followed; thus opening up the entire IoT system to threats and attacks (Rani et al, 2021). While existing threats are easier to manage, emerging threats consist of different combinations of known threats and are therefore dynamic and more challenging.…”
Section: *Corresponding Authormentioning
confidence: 99%