2020
DOI: 10.3390/s20133625
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Abstract: The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
71
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 190 publications
(101 citation statements)
references
References 80 publications
(106 reference statements)
0
71
0
Order By: Relevance
“…In addition, even a valid client that checked for port congestion during a SYN flood attack was able to establish a connection with that port. Given that SYN flood attack is one of the simplest and most common attacks seen on the Internet there are a number of defense mechanisms against it, e.g., SYN cookies [ 42 ]. Therefore, it can be expected that certain protection mechanisms are already implemented in IoT devices and so the devices are resistant to SYN flood attack.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, even a valid client that checked for port congestion during a SYN flood attack was able to establish a connection with that port. Given that SYN flood attack is one of the simplest and most common attacks seen on the Internet there are a number of defense mechanisms against it, e.g., SYN cookies [ 42 ]. Therefore, it can be expected that certain protection mechanisms are already implemented in IoT devices and so the devices are resistant to SYN flood attack.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, the authors of [ 36 ] presented a data intrusion detection system to trigger false data from malicious attacks; Network Trustworthiness: It can be defined as the probability that a packet will reach its destination unaltered despite the adversities (e.g., link failure, link saturation, malicious attacks), and it is a crucial factor of low-power and lossy networks (LLNs) [ 37 ]. Improving network trustworthiness and performance is a challenge that has been addressed from different perspectives such as transmission coding [ 38 , 39 , 40 , 41 ], load balancing and redundancy protocols [ 42 ], transport protocols [ 43 ], dynamic routing and topology control protocols [ 44 , 45 ], cybersecurity mechanisms [ 46 ], and delay tolerant network (DTN) architectures and protocols [ 47 ]. In the case of routing, both proactive routing protocols (e.g., the IPv6 Routing Protocol for low-power and lossy networks (RPL) and optimized link state routing (OLSR)) and reactive routing protocols (e.g., ad hoc on-demand distance vector (AODV) and link-quality source routing (LQSR)) have been proposed in the literature to solve the drawbacks of LLNs and MANETs [ 44 , 45 ]; Social Trustworthiness: This trend has gained more attention since the irruption of the Social Internet of Things (SIoT) concept [ 48 , 49 ].…”
Section: Related Work On Cyber Physical Systems’ Trustworthinessmentioning
confidence: 99%
“…18 Although UIoT is a related concept to the IoUT (Internet of Underwater Things); it focuses on the combination of powerful and advanced technology geared towards achieving the smart ocean. 18 Another recent survey on IoT security by Mrabet et al 19 provides an insight on the protocols, hardware and networking of IoT and their security threats and solutions. However, this article does not cover the unique challenges of IoUT in specific.…”
Section: Prior Researchmentioning
confidence: 99%