2022
DOI: 10.1016/j.cosrev.2022.100467
|View full text |Cite
|
Sign up to set email alerts
|

Landscape of IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 114 publications
(59 citation statements)
references
References 45 publications
0
27
0
Order By: Relevance
“…These are the most common and destructive malicious objects. Device theft, device manipulation, identity theft, and eavesdropping [25] are all serious threats to IoT networks. When the IoT is compromised, it affects both people's lives and data integrity.…”
Section: Internet Of Things Securitymentioning
confidence: 99%
“…These are the most common and destructive malicious objects. Device theft, device manipulation, identity theft, and eavesdropping [25] are all serious threats to IoT networks. When the IoT is compromised, it affects both people's lives and data integrity.…”
Section: Internet Of Things Securitymentioning
confidence: 99%
“…In cases where the integrity of these IoT devices is breached, hackers can use them to form a botnet that can be used as a means of attacking other systems. These IoT botnets can be used to threaten the availability of key servers via a distributed denial of service (DDoS); to spam others; to 'brick' the IoT device so that it no longer works properly; to steal sensitive information; and to mine for cryptocurrencies; or the IoT devices can even be used to cause physical harm when devices are used maliciously in some contexts (Schiller et al, 2022). In all of these cases, the greater the size of the data collected and the greater the extent to which these data collection systems are imbricated in the basic functions of our life, the greater the target richness there is to be gained by illegitimate access.…”
Section: Target Richnessmentioning
confidence: 99%
“…To the best our knowledge, the IoT security in recent years is based on two ways [43], machine learning [23,29,31,34,39] or trusted execution environments [47,48,51]. These approaches often utilize a central server to control resource-constrained IoT devices outside of them.…”
Section: Related Workmentioning
confidence: 99%