2020
DOI: 10.1002/dac.4443
|View full text |Cite
|
Sign up to set email alerts
|

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects

Abstract: SummaryIn the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT‐centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT‐related vulnerabilities. This article… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 149 publications
0
7
0
Order By: Relevance
“…In addition, the authors drew insightful findings and inferences in various sections of the survey. On similar lines, Mahbub et al [43] and Srivastava et al [44] presented the comprehensive work on growing security challenges in terms of vulnerabilities and threats. In another notable work, Makhdoom et al [12] highlighted threats in context to IoT architecture and had given due diligence on the taxonomy of malware attacks with their attack approach.…”
Section: A Scope Of This Surveymentioning
confidence: 96%
“…In addition, the authors drew insightful findings and inferences in various sections of the survey. On similar lines, Mahbub et al [43] and Srivastava et al [44] presented the comprehensive work on growing security challenges in terms of vulnerabilities and threats. In another notable work, Makhdoom et al [12] highlighted threats in context to IoT architecture and had given due diligence on the taxonomy of malware attacks with their attack approach.…”
Section: A Scope Of This Surveymentioning
confidence: 96%
“…In modern technology, both sensor networks and IoT are collaborated efficiently 14,15 to develop many smart applications for real systems. Due to its unique characteristics and dynamic attributes, IIoT network is widely used for industrial and academic fields.…”
Section: Related Workmentioning
confidence: 99%
“…Some of IoT devices are more critical such as smart keys and smart locks. IoT devices collect data about homeowners for better customization and personalization which are stored locally on things or on edge/cloud and unauthorized access to this information can be used for criminal or disruptive activities [5]. Many companies and smart service providers use collected data from IoT devices and train machine learning models to improve advertising and product and service recommendations for users.…”
Section: Privacy Violation Scenariosmentioning
confidence: 99%