2020
DOI: 10.1016/j.jnca.2019.102481
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
283
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 622 publications
(357 citation statements)
references
References 67 publications
0
283
0
2
Order By: Relevance
“…The next layer is the communication network layer. Some of the recent communication technologies used are Wireless Sensor Network (WSN), Bluetooth, ZigBee, WiFi, NB-IoT, LTE, 4G, and 5G ( Ahad et al., 2019 ; Sengupta et al., 2019 ; Buurman et al., 2020 ; Gu et al., 2020 ). These are lightweight protocols that are suitable for low power devices in wireless networks such as Body Area Network (BAN) and Personal Area Network (PAN).…”
Section: Iomt Pandemic Mitigation Architecturementioning
confidence: 99%
See 3 more Smart Citations
“…The next layer is the communication network layer. Some of the recent communication technologies used are Wireless Sensor Network (WSN), Bluetooth, ZigBee, WiFi, NB-IoT, LTE, 4G, and 5G ( Ahad et al., 2019 ; Sengupta et al., 2019 ; Buurman et al., 2020 ; Gu et al., 2020 ). These are lightweight protocols that are suitable for low power devices in wireless networks such as Body Area Network (BAN) and Personal Area Network (PAN).…”
Section: Iomt Pandemic Mitigation Architecturementioning
confidence: 99%
“…While ( Sengupta et al., 2019 ) generalized the IoT architecture as perception layer, network layer, processing layer, and application layer. Focusing on the component interconnection between IPv6 and the physical network ( Liu et al., 2018 ) designed a simplified protocol message format instead of using packet format conversion.…”
Section: Iomt Pandemic Mitigation Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…When the patient has an abnormal situation, the medical equipment sends the early warning information to the medical institution in time. Once MCPS is under cyberattacks, such as data inconsistency, unauthorized access, and data breaches [7], patients' lives and health will be seriously threatened. In practice, medical institutions need to check the accuracy and integrity of shared and sensed medical data before making medical diagnoses.…”
Section: Introductionmentioning
confidence: 99%