2018
DOI: 10.1002/spy2.20
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of securing Internet of Things devices: A survey

Abstract: The current vision of the Internet of Things (IoT) is to ensure that everything from everywhere is connected to the Internet at all times using Internet Protocol (IP). This idea has the potential of making homes, cities, electric grids, among others, safer, more efficient, and easier to manage. Nevertheless, a number of obstacles still remain to fully realize the IoT vision, with security and privacy among the most critical. Ensuring security and privacy in the IoT is particularly complicated, especially for t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 82 publications
(37 citation statements)
references
References 179 publications
(198 reference statements)
0
28
0
Order By: Relevance
“…Thus, identifying the security requirements of an IoT system is a major step towards providing proper security protections. For definitions and detailed discussions of security requirements in the context of IoT, see [17], [83], [84].…”
Section: A Design and Description Of The Security Requirements Elicimentioning
confidence: 99%
“…Thus, identifying the security requirements of an IoT system is a major step towards providing proper security protections. For definitions and detailed discussions of security requirements in the context of IoT, see [17], [83], [84].…”
Section: A Design and Description Of The Security Requirements Elicimentioning
confidence: 99%
“…Samaila et al [19] developed a survey in which information was collected regarding work on security and privacy in IoT in general. The study's scope ranges from security, encryption, communication protocols, authentication to privacy, among others.…”
Section: Related Workmentioning
confidence: 99%
“…These frameworks require installation in the IoT architecture and/or the devices in order the devices to operate effectively resolve security threats. Unfortunately, most security frameworks require considerable computational power, as well as storage [5]. However, some approaches such as light weighted encryption, authentication mechanisms can be employed to overcome the constraints [6].…”
Section: Introductionmentioning
confidence: 99%