2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC) 2020
DOI: 10.1109/jac-ecc51597.2020.9355854
|View full text |Cite
|
Sign up to set email alerts
|

A Review of IoT Security Challenges and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…According to the results, over 60% might refrain from using or purchasing smart products for this reason. This conclusion is supported by both Lu et al (2018), who found that users are highly concerned about privacy and security, and Mehdipour (2020), who stated that more than 70% are concerned about privacy and security in smart homes, which leads to users avoiding the products.…”
Section: Discussionmentioning
confidence: 87%
See 2 more Smart Citations
“…According to the results, over 60% might refrain from using or purchasing smart products for this reason. This conclusion is supported by both Lu et al (2018), who found that users are highly concerned about privacy and security, and Mehdipour (2020), who stated that more than 70% are concerned about privacy and security in smart homes, which leads to users avoiding the products.…”
Section: Discussionmentioning
confidence: 87%
“…The system should be constantly monitored so that threats can be detected in all security layers. If a device is attacked, actions should be taken to eliminate the threat and ensure that it does not spread while the system is self-healing (Chang & Hung, 2021;Iqbal et al, 2020;Mehdipour, 2020). Therefore, important general IoT security measures for producers would be to secure the network with regular patching, updates, antivirus, firewalls, and IDS/IPS with real-time and predictive analytics to monitor the system, implement two-factor authentication including biometrics, and secure the apps by integrating security in the design and encrypting the data.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation