2022
DOI: 10.1109/jiot.2021.3097634
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Bottleneck Between Applications Exploding and User Requirements in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 67 publications
0
8
0
Order By: Relevance
“…IoT developers should understand that “Multivariate Hawkes Process utilizes the mutual exciting property to identify the latent influence between attackers, while the Latent Distance Model captures the sparse interaction property” (Sun et al , 2019, p. 470). Based on Cui et al (2022), it is significant for IoT developers to protect storing users’ data and achieve security and privacy of IoT by using cryptographic algorithms that are characterized lightweight and robust to prevent attackers and hackers from illegal reaching data. Alsetoohy et al (2019) recommended information technologies enterprises deal with other enterprises specialized in security issues to ensure intelligent agent technology software security against hackers and prevent attackers from reaching hotels' and suppliers' sensitive data.…”
Section: Practical Implications and Recommendationsmentioning
confidence: 99%
See 3 more Smart Citations
“…IoT developers should understand that “Multivariate Hawkes Process utilizes the mutual exciting property to identify the latent influence between attackers, while the Latent Distance Model captures the sparse interaction property” (Sun et al , 2019, p. 470). Based on Cui et al (2022), it is significant for IoT developers to protect storing users’ data and achieve security and privacy of IoT by using cryptographic algorithms that are characterized lightweight and robust to prevent attackers and hackers from illegal reaching data. Alsetoohy et al (2019) recommended information technologies enterprises deal with other enterprises specialized in security issues to ensure intelligent agent technology software security against hackers and prevent attackers from reaching hotels' and suppliers' sensitive data.…”
Section: Practical Implications and Recommendationsmentioning
confidence: 99%
“…Figure 5 summarizes and ranks the challenges of IoT adoption in hospitality research, including foodservice and logistics, hotels, restaurants and resorts. The architecture of IoT faces several challenges, including security, privacy, applications' reliability and accuracy, Internet of things applications' scalability and diversity, and energy consumption (Cui et al, 2022). IoT technologies face challenges of malware attacks, protecting the privacy of the user data (Makhdoom et al, 2018), as well as the lack of protocols for speaking among IoT applications (Pizam, 2017).…”
Section: Challenges Of Internet Of Things Adoption In Hospitality Res...mentioning
confidence: 99%
See 2 more Smart Citations
“…Meanwhile, Things are deployed to process (e.g. store or compute) users' data with very low latency near realtime [18]. In many cases, those IoT-enabled BC-based systems are deployed in permissioned settings [19,20], where a TTP or a server monitors and controls the security of the system [21].…”
Section: A Blockchain and Iotmentioning
confidence: 99%