2020
DOI: 10.1109/access.2020.3037359
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 70 publications
(31 citation statements)
references
References 195 publications
0
31
0
Order By: Relevance
“…The possible solution can be strengthening the infrastructural security and using state of the art technologies, that is, blockchain. In addition to that intelligent intrusion detection and prevention system can be used to detect and deploy countermeasures (Khanam et al, 2020).…”
Section: Security and Privacy Issuesmentioning
confidence: 99%
“…The possible solution can be strengthening the infrastructural security and using state of the art technologies, that is, blockchain. In addition to that intelligent intrusion detection and prevention system can be used to detect and deploy countermeasures (Khanam et al, 2020).…”
Section: Security and Privacy Issuesmentioning
confidence: 99%
“…In recent years, 5G Internet of ings technology has been widely used in agriculture, and its advantages such as advancement and intelligence have played an important role in promoting agricultural modernization [1]. In the construction of the tea quality traceability system, 5G Internet of ings technologies such as sensors, RFID, QR codes, and wireless sensor networks are integrated and applied to tea planting, processing, storage, packaging, sales and other links to realize intelligent traceability information collection and processing can effectively improve the credibility and efficiency of traceability, which greatly promotes the quality of famous and high-quality tea in tea enterprises, and is of great significance to the expansion of the brand influence of tea enterprises [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the devices are initialized in different locations, starting to work in an organized and dynamic way 37 . Though, certain issues can compromise the availability of existing services such as the heterogeneity of devices, the power outages, failure of devices, and the presence of attackers 38,39,40 . Furthermore, the wireless communication medium is normally exposed to interference, noise, and collisions, which can damage the quality and availability of the service provided.…”
Section: Background and Related Workmentioning
confidence: 99%