2019
DOI: 10.3390/jsan8020022
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective

Abstract: As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
69
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 71 publications
(73 citation statements)
references
References 148 publications
(212 reference statements)
0
69
0
Order By: Relevance
“…Such attacks and threats may jeopardize the existence of IoT, if they are left untouched. That said, securing IoT seems to be very complex and confusing compared to traditional Internet because of two primary factors [3,4]. One is IoT objects vary from tiny and lightweight objects (e.g., light bulbs) to powerful objects (e.g., smart phones), the majority of which is being connected to the Internet or each other to achieve specific tasks.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Such attacks and threats may jeopardize the existence of IoT, if they are left untouched. That said, securing IoT seems to be very complex and confusing compared to traditional Internet because of two primary factors [3,4]. One is IoT objects vary from tiny and lightweight objects (e.g., light bulbs) to powerful objects (e.g., smart phones), the majority of which is being connected to the Internet or each other to achieve specific tasks.…”
Section: Introductionmentioning
confidence: 99%
“…It is, therefore, possible to apply traditional security mechanisms (e.g., Advanced Encryption Standard (AES)) directly to powerful objects like smart phones. In contrast, tiny objects, for instance light bulbs, may not be able to apply such techniques directly without some modifications due to their limited resources in terms of battery life, memory storage, and computational power [3,5]. To this end, several research proposals have been proposed in this regard, and they can be classified broadly into three categories: (i) gateway-based solutions [6][7][8], (ii) IoT stack-based solutions [9][10][11][12][13], and (iii) middleware-based solutions [14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Such security breach can cause severe health issues to workers if the attacker forces compromised devices to report inaccurate sensor data. Securing such applications is one of the critical challenges nowadays . Keeping this in our mind, Secure‐RPL scheme is proposed in this research paper.…”
Section: Introductionmentioning
confidence: 99%