2021
DOI: 10.1109/access.2021.3057655
|View full text |Cite
|
Sign up to set email alerts
|

Web of Things: Security Challenges and Mechanisms

Abstract: Web of things (WoT) is an improved and most promising infrastructure of the internet of things (IoT) which permits the smart things to not only integrate to the internet but also to the web. It allows the users to share and create content as well as provide capabilities for data aggregation and analysis through a network to become part of the World Wide Web (W3). Despite these advances, it has shown several security challenges that need to be addressed for the successful deployment of WoT on a commercially var… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 60 publications
0
9
0
Order By: Relevance
“…Security is a key requirement for most of WoT systems, and it is also a wide area including issues of authorization to WT functionalities, protection of the underlying Thing, WT data integrity, and confidentiality, just to name a few. At the same time, we remark that most of the WoT security challenges recall the same challenges that affect the IoT and the Web in general, and for which many solutions have been proposed so far [45] [87] [126]. This holds in particular for the W3C WoT, since, as highlighted in [154], "The Web of Things is descriptive, not prescriptive, and so is generally designed to support the security models and mechanisms of the systems it describes, not introduce new ones".…”
Section: F Wt Securingmentioning
confidence: 99%
“…Security is a key requirement for most of WoT systems, and it is also a wide area including issues of authorization to WT functionalities, protection of the underlying Thing, WT data integrity, and confidentiality, just to name a few. At the same time, we remark that most of the WoT security challenges recall the same challenges that affect the IoT and the Web in general, and for which many solutions have been proposed so far [45] [87] [126]. This holds in particular for the W3C WoT, since, as highlighted in [154], "The Web of Things is descriptive, not prescriptive, and so is generally designed to support the security models and mechanisms of the systems it describes, not introduce new ones".…”
Section: F Wt Securingmentioning
confidence: 99%
“…Unauthorized Access: Unauthorized users can access a WoT devices of another person's account through bypassing the different authentication and authorization methods, and then get the possibility to modify any private data stored at the WoT device [12].…”
Section: Wot Security Challengesmentioning
confidence: 99%
“…Eavesdropping: It is a type of man-in-the-middle attack in which confidentiality can be compromised as traffic flows between different objects. By which an attacker can have access to the credentials of the victim by stealing information such as login, and password [12].…”
Section: Wot Security Challengesmentioning
confidence: 99%
See 2 more Smart Citations