2021
DOI: 10.1109/comst.2021.3067354
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Standards for Interoperability and Security in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 106 publications
(36 citation statements)
references
References 63 publications
0
36
0
Order By: Relevance
“…In the near future, vast number of things connected to the Internet will need an IPv6 address since the IPv4 address space will be effectively consumed [41]. Accordingly, IPv6 addressing is now desirable as it provides 2 128 unique addresses or approximately Presents a detailed review of the security-related challenges and sources of threat in the IoT applications Shapla Khanam et al [20] Presents an overview of IoT, its system architecture, enabling technologies, and discusses security challenges Bin Liao et al [21] Analyzes the security of IoT devices and provides the countermeasures in response to security problems and challenges by using mobile computing Salma et al [22] Presents the challenges of IoT security and the security requirements needed by IoT systems Vishal et al [23] Surveys the security, privacy and trust for Smart Mobile-Internet of Things Ismail et al [24] Presents a review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks Pawani et al [25] Surveys the security considerations with 6G enabling technologies Shalitha et al [26] Surveys the exploitation of Network Slicing for Internet of Things in 5G Networks Van-Linh Nguyen et al [27] Surveys the security and privacy issues based on prospective technologies for 6G Dinh C. Nguyen et al [28] Surveys wireless artificial intelligence applications in various data-driven domains Yasmine et al [29] Provides an up-to-date vision of the current research topics related to IoT security and propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers Pasika et al [30] Analyse the security and privacy of the Multi-Access Edge Computing system Zhiyuan Yu et al [31] Surveys the security and privacy problems arising from the interaction of cyber world and physical world, with the context of broad cyber-physical applications Euijong Lee et al [32] Surveys the international standards related to interoperability and security for IoT environments Xing et al [33] Provides an overview of IoT equipment's physical security and safety, antitheft and antivandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods Arup et al [34] Surveys the security and privacy threats for bluetooth low energy in IoT and wearable devices Lijun et al [35] Analyse various dimensions of trust, dynamic changes of context, privacy preserving, and cross-domain issues Jiani et al [36] Provides general security guidelines for IoT-enabled smart city developments, highlights common security challenges and reviews recent cryptographic security implementations for IoT-enabled smart cities Emilie et al…”
Section: Iot Ecosystemmentioning
confidence: 99%
“…In the near future, vast number of things connected to the Internet will need an IPv6 address since the IPv4 address space will be effectively consumed [41]. Accordingly, IPv6 addressing is now desirable as it provides 2 128 unique addresses or approximately Presents a detailed review of the security-related challenges and sources of threat in the IoT applications Shapla Khanam et al [20] Presents an overview of IoT, its system architecture, enabling technologies, and discusses security challenges Bin Liao et al [21] Analyzes the security of IoT devices and provides the countermeasures in response to security problems and challenges by using mobile computing Salma et al [22] Presents the challenges of IoT security and the security requirements needed by IoT systems Vishal et al [23] Surveys the security, privacy and trust for Smart Mobile-Internet of Things Ismail et al [24] Presents a review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks Pawani et al [25] Surveys the security considerations with 6G enabling technologies Shalitha et al [26] Surveys the exploitation of Network Slicing for Internet of Things in 5G Networks Van-Linh Nguyen et al [27] Surveys the security and privacy issues based on prospective technologies for 6G Dinh C. Nguyen et al [28] Surveys wireless artificial intelligence applications in various data-driven domains Yasmine et al [29] Provides an up-to-date vision of the current research topics related to IoT security and propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers Pasika et al [30] Analyse the security and privacy of the Multi-Access Edge Computing system Zhiyuan Yu et al [31] Surveys the security and privacy problems arising from the interaction of cyber world and physical world, with the context of broad cyber-physical applications Euijong Lee et al [32] Surveys the international standards related to interoperability and security for IoT environments Xing et al [33] Provides an overview of IoT equipment's physical security and safety, antitheft and antivandalism schemes along with circuit and system design, additional sensing devices, biometry and behavior analysis, and tracking methods Arup et al [34] Surveys the security and privacy threats for bluetooth low energy in IoT and wearable devices Lijun et al [35] Analyse various dimensions of trust, dynamic changes of context, privacy preserving, and cross-domain issues Jiani et al [36] Provides general security guidelines for IoT-enabled smart city developments, highlights common security challenges and reviews recent cryptographic security implementations for IoT-enabled smart cities Emilie et al…”
Section: Iot Ecosystemmentioning
confidence: 99%
“…The security of IoT, IIoT, and CPS environments is a very broad field of research, and it is possible to find a myriad of studies. Without going into much detail, we refer the readers to the works of Butun et al [15] and Makhdoom et al [5] for extensive overviews of vulnerabilities, threats, and attacks, the security surveys of Lee et al [16] on IoT standards and Granjal et al [17] on the existing IoT protocols, the study of Neshenko et al [7] for a recent comprehensive IoT security survey, the study of Sikder et al [18] for a survey of threats to IoT sensors, the study of Humayed et al [3] for an extensive survey on the threats, vulnerabilities, attacks, and defense solutions to CPS, the survey of Al-Garadi et al [19] for machine and deep learning techniques for IoT security, the comprehensive survey of Yu et al [10] for CPS security and Cintuglu et al [20] for CPS testbeds. There are also studies like that of Babun et al [21] which develop innovative ways to protect networks with vulnerable IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…IoT is far behind in realizing its true potential due to the lack of interoperability. The most comprehensive review on security standards and interoperability goals is presented by Lee et al [19]. To comprehensively review the existing architectures, protocols, and standards is one of the promising means to address the interoperability issues in IoT and other challenges.…”
Section: Introductionmentioning
confidence: 99%