2023
DOI: 10.3390/s23084117
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

Abstract: The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could compromise the confidentiality, integrity, and availability of connected systems. Developing a secure IoT ecosystem is a daunting challenge that requires a systematic and holistic approach to identify and mitigate potential security threats. Cybersecurity research considerations play a critical role in this regard, as they … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
12
0
5

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 88 publications
(48 citation statements)
references
References 184 publications
(274 reference statements)
1
12
0
5
Order By: Relevance
“…Routing and network layers receive data sent by medical data collection layers. These layers use protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPAN), RPL, WiMAX, ZigBee, Sigfox, LoRa, and 5G NR (New Radio) to transmit data to the medical application layer [212], [213], [214]. This setup requires the analysis of routing attacks, potentially compromising confidentiality and accessibility of medical data.…”
Section: Routing Attack and Network Layermentioning
confidence: 99%
“…Routing and network layers receive data sent by medical data collection layers. These layers use protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPAN), RPL, WiMAX, ZigBee, Sigfox, LoRa, and 5G NR (New Radio) to transmit data to the medical application layer [212], [213], [214]. This setup requires the analysis of routing attacks, potentially compromising confidentiality and accessibility of medical data.…”
Section: Routing Attack and Network Layermentioning
confidence: 99%
“…Відомо чимало методів захисту інформації шляхом криптографії та стеганографії [1][2][3][4][5][6][7], проте пропонується розглянути саме методи стеганографії та основні її переваги над першою.…”
Section: вступunclassified
“…Стеганографічний підхід є деяким узагальненням декількох підходів, тому він вважається одним із актуальних напрямків підвищення захищеності даних [2][3][4]. Інтерес до стеганографії в останньому десятилітті відродився через широке поширення мультимедійних технологій.…”
Section: вступunclassified
See 2 more Smart Citations