2019
DOI: 10.19101/ijacr.2019.940088
|View full text |Cite
|
Sign up to set email alerts
|

A survey of IoT security threats and defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…The use of carefully designed artificial noise while relaying can be achieved by interfering only with eavesdroppers without affecting normal users. The literature [15] focused on the impact of the eavesdropper's attack pattern on the security of the system and investigated the communication reliability of normal network users in the case of interference collaboration with eavesdroppers switching between passive eavesdropping and active jamming modes.…”
Section: Related Workmentioning
confidence: 99%
“…The use of carefully designed artificial noise while relaying can be achieved by interfering only with eavesdroppers without affecting normal users. The literature [15] focused on the impact of the eavesdropper's attack pattern on the security of the system and investigated the communication reliability of normal network users in the case of interference collaboration with eavesdroppers switching between passive eavesdropping and active jamming modes.…”
Section: Related Workmentioning
confidence: 99%
“…Current studies using these methods and outputs are presented in Table 1. Cryptographic and noncryptographic methods are used for HF detection but they are not suitable for the resource-constrained IoT ecosystem [21]. New detection methods are needed in terms of limited storage space, processing capacity, and energy source.…”
Section: B Detection and Prevention Approachesmentioning
confidence: 99%
“…Implementation of the Internet of Things (IoT) that is both comprehensive and widespread may also experience potential problems. Everyone's priority should be protecting their personal information and belongings [1,3,4].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers interested in the security of the Internet of Things are focusing their efforts on a variety of different areas, including the establishment of trust between users and objects, the development of more robust security policies, and the protection of sensitive data through authentication procedures. Another line of defense must prevent information from entering the IoT network [3].…”
Section: Introductionmentioning
confidence: 99%