2020
DOI: 10.11591/ijeecs.v18.i3.pp1520-1530
|View full text |Cite
|
Sign up to set email alerts
|

Internet of things: security requirements, attacks and counter measures

Abstract: Internet of Things (IoT) is a network of connected and communicating nodes. Recent developments in IoT have led to advancements like smart home, industrial IoT and smart healthcare etc. This smart life did bring security challenges along with numerous benefits. Monitoring and control in IoT is done using smart phone and web browsers easily.  There are different attacks being launched on IoT layers on daily basis and to ensure system security there are seven basic security requirements which must be met. Here w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…(4) Algorithm complexity: in load balancing technique algorithm must be implementing according to the demand and simple way. When we used complex algorithm it reduce the performances and accuracy of the system (Imdad et al 2020 ). (5) Load balancer scalability: on demand of user different service is providing within the time load balancer section work.…”
Section: Preliminarymentioning
confidence: 99%
“…(4) Algorithm complexity: in load balancing technique algorithm must be implementing according to the demand and simple way. When we used complex algorithm it reduce the performances and accuracy of the system (Imdad et al 2020 ). (5) Load balancer scalability: on demand of user different service is providing within the time load balancer section work.…”
Section: Preliminarymentioning
confidence: 99%
“…However, as demonstrated in previous studies [5], [6], there are still possible concerns because practically all algorithms inherit the attributes of a classic domain extension Merkle-Damgârd [7], [8], which have been found to be vulnerable [9], [10]. Moreover, several surveys discussed the vulnerabilities in authentication methods [11], internet of things (IoT) systems [12]-[14], and network design [15], and called for creative solutions to address these issues.…”
Section: Introductionmentioning
confidence: 99%
“…Sensor-based real-time event monitoring is gaining popularity as the internet of things grows [1]- [13]. A temperature monitoring system with device control is required [14].…”
Section: Introductionmentioning
confidence: 99%