Filters








8,804 Hits in 4.5 sec

A Review on Internet of Things (IoT): Security Challenges, Issuesand the Countermeasures approaches

Dr. B. Sundaravadivazhagan, Dr. B. Subashini, Mr. Mohemed Ashik M
2021 Psychology (Savannah, Ga.)  
This study has detailed review of IoT layered design, each of these layers having lot of security challenges such as threats, vulnerabilities and attacks.  ...  The aim of this survey focus on the main objective of the security challenges and issues in the data privacy, security, confidentiality, integrity, availability, access control, encryption, default password  ...  The survey also offers a review, discusses IoT threats and problems, and introduces potential intrusion detection solutions for the network.  ... 
doi:10.17762/pae.v58i2.3188 fatcat:bzgximmiazdjzh3iq2z4texjdi

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu, Nicu Bizon
2021 Sustainability  
Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed.  ...  With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su13169463 doaj:44db3364484545048c70058a0a459fd4 fatcat:f5ruitiqprhxlfnx4iiwcf67ju

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats Countermeasures [article]

Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman
2020 arXiv   pre-print
However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and  ...  Security and privacy of the users have become significant concerns due to the involvement of the Internet of things (IoT) devices in numerous applications.  ...  threats are discussed Threats in IoT The latest survey on IoT security or privacy and their solutions using ML and/or BC are categorized.  ... 
arXiv:2002.03488v4 fatcat:cxavellepncexgkfcs5phdj53u

A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT

Rajani Chetan, Ramesh Shahabadkar
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT.  ...  At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws.  ...  It also provides a discussion on the existing security threats and related solutions corresponding to each layer of IoT architecture.  ... 
doi:10.11591/ijece.v8i4.pp2319-2326 fatcat:burfrwji4vdznozho2kiluuqpm

Mobile Computing for IoT Device Security Analysis

Nikita Valte, Gautam M. Borkar
2022 Zenodo  
Because the majority of IoT devices are battery-powered and consume little power, IoT security is a serious concern.  ...  In the IOT environment, the data can be malfunction by various attacks and threats.  ...  The Internet of Things (IoT) is used to manage data streams at the mobile edge. Survey on security threats of smartphones in Internet of Things by M. H.  ... 
doi:10.5281/zenodo.6663047 fatcat:qgifzxa7ffdhnhgzamsb4zucum

Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications

Nasr Abosata, Saba Al-Rubaye, Gokhan Inalhan, Christos Emmanouilidis
2021 Sensors  
To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications.  ...  It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems  ...  This survey has presented various security threats at different IoT layers, including security challenges and solutions regarding the end-to-end IoT environment.  ... 
doi:10.3390/s21113654 pmid:34073975 fatcat:xkrxpjwiuza6jjyvpps74pdpgm

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey [article]

Sita Rani, Aman Kataria, Vishal Sharma, Smarajit Ghosh, Vinod Karar, Kyungroul Lee, Chang Choi
2021 arXiv   pre-print
Hence, the study of IoT security threats and possible corrective measures can benefit the researchers to identify appropriate solutions to deal with various challenges in cybercrime investigation.  ...  IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies.  ...  et al. (2017) [59] A survey on different types of threats in IoT and their solutions is discussed.Applications of IoT, Threats to IoT, Analysis of different types of attacks.Applications of IoT and  ... 
arXiv:2010.08793v4 fatcat:ivm6awqafffx3neqrab763eo2e

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved [article]

Wei Zhou, Yuqing Zhang, Peng Liu
2018 arXiv   pre-print
Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.  ...  To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of "IoT features".  ...  Index Terms-Internet-of-Things (IoT), IoT features, privacy, security, survey. I.  ... 
arXiv:1802.03110v1 fatcat:4ikey6amyzfktawcmpo4z7ke5u

Security trends in Internet of Things: a survey

Rachit, Shobha Bhatt, Prakash Rao Ragiri
2021 SN Applied Sciences  
A security-specific comparative analysis of protocols, standards, and proffered security models are presented as per IoT security requirements.  ...  We have presented a detailed review in this study that focuses on IoT's imminent security aspects, covering identification of risks pertaining to the current IoT system, novel security protocols, and security  ...  A thorough review presented in this survey focuses on prominent threats prevailing in current IoT systems, along with the latest security models proffered for the IoT environment in recent years.  ... 
doi:10.1007/s42452-021-04156-9 fatcat:46srogfggjhndgeuy6lqyllsxq

Verification and Validation Techniques for Streaming Big Data Analytics in Internet ofThings Environment

Sudeep Tanwar, Aparna Kumari, Sudhanshu Tyagi, Neeraj Kumar
2018 IET Networks  
Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service  ...  It includes the major threats and risks, introduced during big data processing in Internet of things environment.  ...  [10] surveyed the taxonomy of security attacks in IoT and implementation for secure solutions. Furthermore, Chandra et al.  ... 
doi:10.1049/iet-net.2018.518 fatcat:r4ss3v5m65gjljviwagzlvay3y

Security Considerations for Internet of Things: A Survey

Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac
2020 SN Computer Science  
This paper is focusing on a survey on IoT security and aims to highlight the most significant problems related to safety and security in the IoT ecosystems.  ...  This survey identifies the general threat and attack vectors against IoT devices while highlighting the flaws and weak points that can lead to breaching the security.  ...  [148] conducted a survey that covers the segments: limitations of IoT devices and their solutions, classification of IoT attacks, authentication and access control mechanisms, and security analysis  ... 
doi:10.1007/s42979-020-00201-3 fatcat:4gkafccu7vgq7olrqdxdpgm2eu

Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security

Hannes Tschofenig, Emmanuel Baccelli
2019 IEEE Security and Privacy  
This paper surveys IoT security protocols standardized by the IETF, maps protocols to regulatory IoT security guidelines (from ENISA), and discusses remaining gaps.  ...  We observe that, while IETF protocols alone do not completely secure IoT devices, they go a long way.  ...  Categories of Attacks The common approach to designing a security solution is to conduct a threat analysis first.  ... 
doi:10.1109/msec.2019.2923973 fatcat:wq6ds4mjcraqneiagxshqzfjbe

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai
2020 Sensors  
Likewise, we propose a new classification of security threats and attacks based on new IoT architecture.  ...  Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions.  ...  IoT AWS IoT A Layered Security Analysis of Internet of Things: Survey, Open Issues and Opportuniti es Security Threats and attacks SMQTT TCP flooding UDP flooding SYN flooding De-  ... 
doi:10.3390/s20133625 pmid:32605178 pmcid:PMC7374330 fatcat:rk52vsqrrzd2hebt2xddhrdt54

INTERNET OF THINGS (IOT) MEDICAL SECURITY: TAXONOMY AND PERCEPTION

2020 Issues in Information Systems  
This study empirically develops an IoT Medical taxonomy with implications for categorizing and matching IoT security in the healthcare field to users by: (1) identifying the characteristics of IoT security  ...  The research analyzes the users' perceptions of IoT Medical security in terms of the fundamental issues such as confidentiality, integrity, availability, authentication, authorization, and audit.  ...  IoT Classification IoT Security Taxonomy Authentication Threats in IoT Medical The STRIDE threat model, a cybersecurity guiding principle, addresses a wide range of security threats holistically.  ... 
doi:10.48009/3_iis_2020_227-235 fatcat:3g236tq42ja3viwpk3enlidqvm

IoT Industry & Security Technology Trends

Se-Hwan Park, Jong-Kyu Park
2016 International journal of advanced smart convergence  
Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking.  ...  This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed.  ...  As a result, security-related IoT survey 2/3 of the respondents the following concerns about security, and that is in response to [9] : -There is a vulnerability in the IoT is 17.2 percent almost seems  ... 
doi:10.7236/ijasc.2016.5.3.27 fatcat:ybzfx6voonh5lgpowaaquvc4oy
« Previous Showing results 1 — 15 out of 8,804 results