2017
DOI: 10.1142/s2424862217500087
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of IoT Security: Risks, Requirements, Trends, and Key Technologies

Abstract: Due to the increasing ubiquity of the internet, the “internet of things” (IoT) has become an essential technology, penetrating people’s daily lives and influencing the industry. However, the diversity of environments and lack of standards have left the IoT exposed to security and privacy threats. This paper examines these risks, the security requirements of the IoT, the time trend of IoT-security related research, and key security technologies related to the IoT.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 74 publications
0
8
0
Order By: Relevance
“…To improve security of IoT, many solutions have been proposed (Kim 2017;Li and Xu 2017). propose immune theory and intrusion detection for improving security in IoT.…”
Section: Challengesmentioning
confidence: 99%
“…To improve security of IoT, many solutions have been proposed (Kim 2017;Li and Xu 2017). propose immune theory and intrusion detection for improving security in IoT.…”
Section: Challengesmentioning
confidence: 99%
“…The sensing layer must guarantee the security of the physical operation and sensor data [31]. It uses lightweight encryption authentication technologies, data encryption storage, and mutual authentication to strengthen security [32]. The transmission layer must ensure the confidentiality and integrity when transmitting data to the remote processing platform [33], involving network security, Virtual Private Network (VPN), key authentication intrusion detection, and virus detection.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Risk handling or management depends on the careful application for alleviating different categories of possible IoT vulnerabilities that can be targeted by the threat actors. Intuitively, some IoT vulnerabilities are not identified in advance, which is known as zero-days (0 days) vulnerabilities [47].…”
Section: Iot Risksmentioning
confidence: 99%