Abstract:The IoT has primarily focused on establishing connectivity in a diversify of constrained networking environments, and the next logical aim is to build on top of network connectivity by focusing on the application layer. In the Web of Things (WoT), we are thinking about smart things as first class citizens of the Web. We position the Web of Things as a purification of the Internet of Things by integrating smart things not only into the Internet, for instance the network, but into the Web (the application layer)… Show more
“…WoT has more than one architecture, such as the useradapted WoT architecture [6], the WoT Servient architecture [7] and the architecture of the WoT Open Platform [8]. But the four-layer WoT architecture [9] (see figure 1) remains the most well known.…”
Section: Wot Architecturesmentioning
confidence: 99%
“…First, the TLS protocol which secures transactions on the web. Then there are other techniques such as web-based delegated authentication mechanisms, such as OAuth, which can be integrated into our object APIs [8]. The most important criterion for a WoT sharing platform is to be secure, so that access to smart objects is only possible for authorized persons.…”
Our world is hugely impacted by revolutionary innovations in telecommunication technologies where connected objects increase rapidly. The Web of Things (WoT) represents the most promising application models of the Internet of Things (IoT). The ultimate goal of the WoT is to create a search engine where the user or devices can find other devices anywhere and anytime in order to take advantage of the resources of other devices. Nowaday, IoT systems imperatively need scalability and flexible coupling, which are easily offered by WoT. However, researchers have raised some concerns about the security of WoT. This paper provides a recent review of WoT literature. A special attention is accorded to the most relevant WoT security issues. Our paper also deals with the most important attacks in the domain and with some selected security solutions.
“…WoT has more than one architecture, such as the useradapted WoT architecture [6], the WoT Servient architecture [7] and the architecture of the WoT Open Platform [8]. But the four-layer WoT architecture [9] (see figure 1) remains the most well known.…”
Section: Wot Architecturesmentioning
confidence: 99%
“…First, the TLS protocol which secures transactions on the web. Then there are other techniques such as web-based delegated authentication mechanisms, such as OAuth, which can be integrated into our object APIs [8]. The most important criterion for a WoT sharing platform is to be secure, so that access to smart objects is only possible for authorized persons.…”
Our world is hugely impacted by revolutionary innovations in telecommunication technologies where connected objects increase rapidly. The Web of Things (WoT) represents the most promising application models of the Internet of Things (IoT). The ultimate goal of the WoT is to create a search engine where the user or devices can find other devices anywhere and anytime in order to take advantage of the resources of other devices. Nowaday, IoT systems imperatively need scalability and flexible coupling, which are easily offered by WoT. However, researchers have raised some concerns about the security of WoT. This paper provides a recent review of WoT literature. A special attention is accorded to the most relevant WoT security issues. Our paper also deals with the most important attacks in the domain and with some selected security solutions.
“…According to a forecast by Bain and Company, the IoT market will grow by 520 billion dollars by 2021. IoT provides the user with a variety of important and non-critical appliances, such as appliances, sensors, printers, and Wi-Fi routers, among other routers, through its secure network [81]. According to Cytelligence, hackers attacked smart home and internet of things (IoT) devices such as smart TVs, voice assistants, [82] connected baby monitors, and cell phones more frequently in 2019.…”
Section: Internet Of Things (Iot) Securitymentioning
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.
“…The IoNT could provide much more detailed, inexpensive, and up-to-date pictures of our cities, homes, factories even our bodies. Today traffic lights, wearables, or surveillance cameras are getting connected to the Internet [30]. Next up billions of nanosensors harvesting huge amounts of real-time information and beaming it up to the cloud.…”
Section: Figure 1 the Outlook For The Fabrication And Integration Of Nanosensorsmentioning
confidence: 99%
“…The IoNT is an extension of the Internet of everything [30], but where you have the possibility of incorporating nanosensors in various objects and using nano-networks. That is, the reasonof IoNT consists of the capacity to interconnect diverse types of devices developed at a nano-scale in a communication network, where it allows the collection of data in places with difficult access [37].…”
Section: Figure 3 the Nano Communication In Internet Of Nano Thingsmentioning
The increase of intelligent environments suggests the interconnectivity of applications and the use of the Internet. For this reason, arise what is known as the Internet of Things (IoT). The expansion of the IoT concept gives access to the Internet of Nano Things (IoNT). A new communication networks paradigm based on nano technology and IoT, in other words, a paradigm with the capacity to interconnect nano-scale devices through existing networks. From the interconnection of these nano machines with the Internet emerged the concept of Internet of Nano Things (IoNT). The Internet of Nano-Things (IoNT) is a system of nano connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. The data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The nano-networks paradigm can empower the consumers to make a difference to their well-being by connecting data to personalized analysis within timely insights. The real-time data can be used in a diversification of nano-applications in the Internet of Nano-Things (IoNT), from preventive treatment to diagnostics and rehabilitation. In this paper intelligibly explains the Internet of Nano Things (IoNT), its architecture, challenges, explains the role of IoNT in global market, IoNT applications in various domains. Internet of things has provided countless new opportunity to create a powerful industrialized structure and many more. The key applications for IoNT communication including healthcare, transportation and logistics, defense and aerospace, media and entertainment, manufacturing, oil and gas, high speed data transfer & cellular, multimedia, immune system support and others services. In the end, since security is considered to be one of the main issues of the IoNT system, we provide an in-depth discussion on security, communication network and Internet of Nano Things (IoNT) market trends.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.