2016
DOI: 10.2507/26th.daaam.proceedings.102
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Security Risks in the IoT Environment

Abstract: The concept of Internet of Things (IoT) is based on a layered architecture. Each of the layers includes the application of a range of diverse technologies for the data transmission, processing and storage. This paper will explore the vulnerabilities and threats in IoT environment and protection methods that can be implemented within such an environment due to the hardware limitations of the existing equipment and technology used for data transfer. Based on the results of the research, classification of securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 25 publications
(30 reference statements)
0
18
0
Order By: Relevance
“…Cvitic et al [168] identify various limitations and propose partial solutions. They propose a lightweight encryption function using Identity Based Encryption, called VLFSR.…”
Section: Rfidmentioning
confidence: 99%
“…Cvitic et al [168] identify various limitations and propose partial solutions. They propose a lightweight encryption function using Identity Based Encryption, called VLFSR.…”
Section: Rfidmentioning
confidence: 99%
“…Additionally, the threats and security problems inherited from the traditional network [37]. As shown in Figure 2, the attacks classified on the IoT three layers: perception, network, and application-layer [38]. Artificial intelligence has attracted attention in recent years, especially in the field of IoT security.…”
Section: Iot Security Overviewmentioning
confidence: 99%
“…The reasons lie in a large number of users and data that are processed and stored in the observed layer as well as the known vulnerabilities of virtualisation whose unauthorized usage has the potential to cause damage of great dimensions to a large number of users at a time. The classification of risk to the user information system in the traffic environment is based on the increased implementation of the IoT concept in certain environment according to which the level of risk Medium has been assigned (Cvitić et al 2016).…”
Section: Classification Of the Security Risk Of The Proposed Iot Archmentioning
confidence: 99%