2022
DOI: 10.1016/j.iot.2022.100564
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security in internet of things with a focus on the impact of emerging technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(33 citation statements)
references
References 67 publications
0
6
0
1
Order By: Relevance
“…The techniques were found to be relatively accurate with a high detection rate. However, the advanced blockchain technique was also successfully implemented for smart metering security against classical and quantum attacks; though with limitations of high latency/delay [28,108,109]. All these advanced techniques for securing AMI are open to improvements for future work.…”
Section: Open Issues/future Researchmentioning
confidence: 99%
“…The techniques were found to be relatively accurate with a high detection rate. However, the advanced blockchain technique was also successfully implemented for smart metering security against classical and quantum attacks; though with limitations of high latency/delay [28,108,109]. All these advanced techniques for securing AMI are open to improvements for future work.…”
Section: Open Issues/future Researchmentioning
confidence: 99%
“…IoT devices commonly operate under resource constraints, featuring limited processing power, memory capacity, and energy resources. Consequently, they become susceptible to various side‐channel attacks, including power analysis attacks, timing attacks, electromagnetic attacks, fault attacks, cache attacks, side‐channel attacks related to radio frequency (RF) communication and so forth 17–20 Power analysis attacks: These attacks exploit a device's power consumption variations during cryptographic operations.…”
Section: Iot Botnet Attacksmentioning
confidence: 99%
“…The security of IoT-based smart home consumer devices is an important problem [55][56][57][58][59]. Although our experiments in this work have focused on IKEA products to demonstrate vulnerabilities, the security of other IoT-based smart home devices has been ranked in other works [60].…”
Section: Reflection On the Experimentsmentioning
confidence: 99%