2021
DOI: 10.3390/electronics10212647
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques

Abstract: Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(25 citation statements)
references
References 113 publications
(111 reference statements)
0
19
0
Order By: Relevance
“…Such attacks pose a serious threat for wireless sensor networks. Different IoT wireless network attacks and detection possibilities were presented by Pamarthi and Narmadha [77] and Balogh et al [78].…”
Section: B Lack Of Budget and Knowledgementioning
confidence: 99%
“…Such attacks pose a serious threat for wireless sensor networks. Different IoT wireless network attacks and detection possibilities were presented by Pamarthi and Narmadha [77] and Balogh et al [78].…”
Section: B Lack Of Budget and Knowledgementioning
confidence: 99%
“…• Important challenge in intrusion detection based on IoT is that as time passes, the attacks become more intelligent and diverse [142]. The current IDSs are based on pattern-based or behavior-based statistical methods, which may not provide fundamental solutions for security intrusion or attacks [142,143]. A suggested solution by [142] is to use ontology reasoning to intelligently respond to security intrusions while employing an access control technique.…”
Section: Challenges and Recommendationsmentioning
confidence: 99%
“…Some IoT devices do not have enough computing memory for executing security precautions. Securing an IoT device against certain types of attacks consumes a significant amount of energy; thus, it is critical to first identify potential threats and then implement proper countermeasures for the specific architecture of the developed IoT system [143]. ML/DL techniques such as autoencoder can be used to handle potential threats (anomaly) since it requires knowledge of normal system operation only and it will identify the threat automatically when it crosses a certain threshold value [5,104].…”
Section: Challenges and Recommendationsmentioning
confidence: 99%
“…Thus, for strong security guarantees in an integrated healthcare environment user authentication is a very important step. Blockchains are transformative technology that has the potential to change many sectors [ 30 , 31 , 32 ]. On the other hand, the downside of Blockchain technology is that it consumes a lot of energy to remain operational because they are incentivized to solve complex mathematical problems.…”
Section: Introductionmentioning
confidence: 99%