2021
DOI: 10.1109/access.2021.3103725
|View full text |Cite
|
Sign up to set email alerts
|

Recent Security Trends in Internet of Things: A Comprehensive Survey

Abstract: The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecosystem with digital data accessible anywhere and anytime. "Things" in IoT are embedded with sensing, processing and actuating capabilities and cooperate in providing smart and innovative services autonomously. The rapid spread of IoT services arises different security vulnerabilities that need to be carefully addressed. Several emerging and promising technologies and techniques are introduced to improve the secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 55 publications
(23 citation statements)
references
References 105 publications
0
17
0
1
Order By: Relevance
“…In [ 67 ], the security trends for IoT devices are assessed. A total of 20 surveys are reviewed, and ML is considered in only 25% of them.…”
Section: Analysis Of Existing Review Workmentioning
confidence: 99%
“…In [ 67 ], the security trends for IoT devices are assessed. A total of 20 surveys are reviewed, and ML is considered in only 25% of them.…”
Section: Analysis Of Existing Review Workmentioning
confidence: 99%
“…It is capable to ensure the integrity of the software and configuration of all the nodes and, thus, to avoid the exchange of incorrect synchronization information over secure protocols. For a more complete view on prior works about SW vulnerabilities in other domains, interested readers can also refer to [29][30][31] and the references therein.…”
Section: Master Clockmentioning
confidence: 99%
“…Previous challenges can be dealt with by fog computing [ 9 ]. According to the prediction by Cisco, approximately 1 trillion IoT devices will be linked to the internet by 2025 [ 10 ]. Resource management in the fog computing environment has become a big concern due to changes in the devices of users in terms of bandwidth, computation, latency, and storage [ 11 ].…”
Section: Introductionmentioning
confidence: 99%