2022
DOI: 10.1155/2022/5724168
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Security and Privacy Concerns in the Internet of Things (IoT)

Abstract: The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications’ connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code injections, and backdoor attacks. Traditional threats provide essential services such as authentication, authorization, and accountability. Authentication and author… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 158 publications
0
4
0
Order By: Relevance
“…Analysis of IoT Security and Privacy Issues:Analysis of IoT Security and Privacy Issues: Current research underscores the pressing demand for sophisticated security measures in IoT, as explored in "A Review of Security and Privacy Concerns in the Internet of Things (IoT) [33]." This study delineates a variety of security threats that IoT systems face, including malware and cyberattacks.…”
Section: Resultsmentioning
confidence: 99%
“…Analysis of IoT Security and Privacy Issues:Analysis of IoT Security and Privacy Issues: Current research underscores the pressing demand for sophisticated security measures in IoT, as explored in "A Review of Security and Privacy Concerns in the Internet of Things (IoT) [33]." This study delineates a variety of security threats that IoT systems face, including malware and cyberattacks.…”
Section: Resultsmentioning
confidence: 99%
“…The integration of HashiCorp Vault is instrumental in securely managing access tokens, API keys, and other sensitive information [30]. This integration elevates overall security through the following measures that are explained below and depicted in Figure 7 through policies:…”
Section: Vault Integrationmentioning
confidence: 99%
“…Despite the benefits, various downsides are observed. IIoT-driven systems have weak security and privacy configurations, therefore they can be hacked by various network attacks [24], [25].…”
Section: Literature Reviewmentioning
confidence: 99%