2018
DOI: 10.1016/j.comnet.2018.03.012
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things security: A top-down survey

Abstract: Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims to integrate seamlessly both physical and digital worlds in one single ecosystem that makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. However, as new emergent technology, IoT suffers from seve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
217
0
7

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 444 publications
(225 citation statements)
references
References 108 publications
1
217
0
7
Order By: Relevance
“…Thus, standard interfaces are needed to fulfill this interoperability issue among IoT applications and heterogeneous IoT platforms. Also, security requirements must be addressed, such as authentication, authorization and access control, and secure communication [26,27]. FIWARE [28] is an open-source IoT platform that has been attracting widespread attention in the last years, comprised of a series of generic enablers (GEs) that provide different services.…”
Section: Of 24mentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, standard interfaces are needed to fulfill this interoperability issue among IoT applications and heterogeneous IoT platforms. Also, security requirements must be addressed, such as authentication, authorization and access control, and secure communication [26,27]. FIWARE [28] is an open-source IoT platform that has been attracting widespread attention in the last years, comprised of a series of generic enablers (GEs) that provide different services.…”
Section: Of 24mentioning
confidence: 99%
“…A critical concern in the development of IoT smart applications is security [26,27,43]. The applications must deal with data privacy, confidentiality, integrity, authentication, and availability of services.…”
Section: Iot Smart Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The works of Sun et al (Sun, Yan, & Zhang, 2016), Samaniego & Deters (Samaniego & Deters, 2016) and Reyna et al (Reyna, Martín, Chen, Soler, & Díaz, 2018;Atzori, Iera, & Morabito, 2010) are worth mentioning in this regard. Many studies (Jesus, Chicarino, Albuquerque, & Rocha, 2018;Kouicem, Bouabdallah, & Lakhlef, 2018) The Filament 1 research projects involve designing and developing a wireless network cable of controlling "any" systemranging from street bulbs of a city to burglar alarm system of any office. That being said, the projects highly focus on the use of blockchain and smart contract to enable smart devices (such as sensors, smart refrigerator, smart TV or any other smart appliances) to interact with each other via seamless Machine-to-Machine (M2M) communications including discovering and exchanging messagesautonomously, without being controlled by any central authority.…”
Section: Application Of Blockchain For Enhanced Iot Securitymentioning
confidence: 99%
“…II Enhanced list of papers and coverage of more stateof-the-art solutions with focus on ML and DL 2017 [7] Communication standards in IoT N/A ML-and DL-based generic solutions in IoT 2016 [8] Network types, technologies and their characteristics Sec. II Focus on state-of-the-art solutions in IoT and coverage of resource management, security, and privacy 2017 [9] Health-care communications standards in IoT N/A Focus on generic IoT and in-depth coverage of the solutions 2018 [10] Architecture, scheduling, network technologies, and power management of IoT operating systems N/A focus on the current solutions for generic IoT applications and future research directions 2018 [11] Blockchain and SDN solutions for IoT N/A Generic IoT and in-depth review of the ML-and DL-based solutions in multiple domains 2018 [12] Resource scheduling techniques in IoT Sec. II Detailed investigation of resource management in IoT and state-of-the-art techniques 2016 [13] Secure routing protocols in IoT N/A Focus on the applications and resource management with security and privacy 2017 [14] Trust models for service management in IoT N/A Coverage of overall aspects of security with solutions based on ML and DL 2019 [15] data fusion in IoT applications through ML N/A In-depth coverage of ML and DL in different aspects of IoT 2018 [16] IoT data analytics through DL N/A In-depth review of ML-and DL-based solutions in IoT associate with a Base Station (BS) or a gateway node to connect to the Internet.…”
Section: Introductionmentioning
confidence: 99%