2020
DOI: 10.1016/j.cosrev.2020.100312
|View full text |Cite
|
Sign up to set email alerts
|

A survey on privacy and security of Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
46
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(47 citation statements)
references
References 78 publications
0
46
0
1
Order By: Relevance
“…Many works in the literature cover the various aspects of the threats and attacks in IoT. Authors in [20][21][22][23][24][25][26] cover the taxonomy of the threats and attacks pertaining to the IoT. These works mainly focus on two broad categories: the architecture of IoT and protocols/standards in IoT.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…Many works in the literature cover the various aspects of the threats and attacks in IoT. Authors in [20][21][22][23][24][25][26] cover the taxonomy of the threats and attacks pertaining to the IoT. These works mainly focus on two broad categories: the architecture of IoT and protocols/standards in IoT.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
“…The countermeasures have also been discussed. Ogonji has comprehensively presented a threat taxonomy for the IoT environment in [22], including two broad categories: security threat and privacy threat. The authors of this survey presented taxonomy and countermeasures for the three-layer domain-specific IoT architecture.…”
Section: Comparison With Existing Surveysmentioning
confidence: 99%
“…Moreover, the loss from security events can be severe due to the effective connectivity and scale of the IoT networks. Earlier research on IoT security [ 14 , 15 ] has discussed some significant factors; one is key management. According to the studies, security keys can be sniffed by several attacks, considering that IoT devices are usually deployed wherever the attacker can reach them.…”
Section: Introductionmentioning
confidence: 99%
“…LoRaWAN protocol [24] is designed for limited battery applications where wide-range communication with low power consumption is primary. LoRaWAN v1.02 specification defines the network ranges to be (5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15) km; data rates range between 0.3 and 50 kbps, and the network is operated over the 868-MHz and 900-MHz bands. LoRaWAN is one of the essential technologies for IoT that has grown based on the network star topology.…”
mentioning
confidence: 99%
“…The Internet of Things (IoT) is a growing platform and expands exponentially. This newfound innovation has had a remarkable effect on people's lives and the business sector as it empowers companies to automate processes and decrease employment costs [1]. It improved service quality, making it economical for production and goods delivery.…”
Section: Introductionmentioning
confidence: 99%