2019 2nd International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2019
DOI: 10.1109/cais.2019.8769560
|View full text |Cite
|
Sign up to set email alerts
|

CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(38 citation statements)
references
References 13 publications
0
23
0
Order By: Relevance
“…There is no doubt that the historical stage in which we are immersed is producing and will produce very significant changes for humanity. This technological period is characterised by new challenges for users that arise from the increase in the amount of data (Big Data) [9,10], from decisions taken automatically (artificial intelligence and robots) [11], from reduced visibility and greater ambiguity [12], and from greater risks to security and privacy (cybersecurity) [13,14]. In addition, there is the possibility that only a select group of the population will benefit, so it is important to study this stage from a perspective of digital inequality, where the digital divide means differences between the population that has access to the Internet and those that cannot connect to it at home.…”
Section: Introductionmentioning
confidence: 99%
“…There is no doubt that the historical stage in which we are immersed is producing and will produce very significant changes for humanity. This technological period is characterised by new challenges for users that arise from the increase in the amount of data (Big Data) [9,10], from decisions taken automatically (artificial intelligence and robots) [11], from reduced visibility and greater ambiguity [12], and from greater risks to security and privacy (cybersecurity) [13,14]. In addition, there is the possibility that only a select group of the population will benefit, so it is important to study this stage from a perspective of digital inequality, where the digital divide means differences between the population that has access to the Internet and those that cannot connect to it at home.…”
Section: Introductionmentioning
confidence: 99%
“…Remote attacks are growing in number, and also becoming more and more complicated. Crypto jacking is the main types of remote access attack in 2018.This targets the owners of crypto currencies [2]. Perimeter devices have threatened is another type of attack.…”
Section: Remote Access Attacksmentioning
confidence: 99%
“…In this last two decades the risk in security has been increased rapidly. The Internet is been connected with all devices in this world [2]. Computers are providing the common platform to everyone in digital environment for accessing the devices connected to the internet.…”
Section: Introductionmentioning
confidence: 99%
“…Data from the main academic databases have been collected to study the scope of potential research in the domain of cybersecurity in IoT [16]. Figure 3 depicts the number of research papers referred to in the survey related to security issues in IoT from the year 1998 to 2020.…”
Section: Introductionmentioning
confidence: 99%
“…Data on crime complaints and financial losses from 2015 to 2020[16,231].Year Number of complaints registered Total loss (in $billion)…”
mentioning
confidence: 99%