2019
DOI: 10.1109/jcn.2019.000048
|View full text |Cite
|
Sign up to set email alerts
|

On the security aspects of Internet of Things: A systematic literature review

Abstract: Internet of Things (IoT) has gained increasing visibility among emerging technologies and undoubtedly changing our daily life. Its adoption is strengthened by the growth of connected devices (things) as shown in recent statistics. However, as the number of connected things grows, responsibility related to security aspects also needs to increase. For instance, cyberattacks might happen if simple authentication mechanisms are not implemented on IoT applications, or if access control mechanisms are weakly define… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(19 citation statements)
references
References 100 publications
0
14
0
3
Order By: Relevance
“…To better verify this intuition and further illustrate the interpretability of our model, we fix the threshold (α) described in Equation (3) as 0.4 and draw Figure 8 to display the relation between the number of GCN layers and the performance (macro-F1) of our model. We report the macro-F1 values for three domains under different numbers of GCN layers L within [1,2,3,4,5,6]. It is worth noting that we only draw the line when L ≤ 6 because there is no improvement obtained when L > 6.…”
Section: Results Analysismentioning
confidence: 99%
“…To better verify this intuition and further illustrate the interpretability of our model, we fix the threshold (α) described in Equation (3) as 0.4 and draw Figure 8 to display the relation between the number of GCN layers and the performance (macro-F1) of our model. We report the macro-F1 values for three domains under different numbers of GCN layers L within [1,2,3,4,5,6]. It is worth noting that we only draw the line when L ≤ 6 because there is no improvement obtained when L > 6.…”
Section: Results Analysismentioning
confidence: 99%
“…Mohab Aly et al [16] systematically analysed the security issues pertaining to IoT based upon different layers. Evandro L. C. Macedo et al [17] conducted SLR to analyse the security based upon four security aspects such as trust, access control, data protection, and authentication. Juan Martínez et al [18] highlighted threats, attacks, challenges and countermeasures related to security of IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Research efforts studied this challenging topic under different perspectives. In recent years, several surveys aimed at reviewing and classifying these efforts have been published (see, e.g., [6][7][8][9][10][11][12][13][14][15][16]). More specifically, Aly et al [6] consider the layers of the IoT reference models and present a systematic literature review aimed at providing guidelines for researchers and practitioners interested in understanding security issues.…”
Section: Introductionmentioning
confidence: 99%