2020
DOI: 10.5120/ijca2020920548
|View full text |Cite
|
Sign up to set email alerts
|

Review on the Security Threats of Internet of Things

Abstract: Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT network is maintaining privacy and to overcome security threats. This paper provides a systematic review of the security aspects of IoT. Firstly, the application of IoT in industrial and medical service scenarios are described, and the security threats are discussed for the differen… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 54 publications
(45 reference statements)
0
11
0
Order By: Relevance
“…Various types of intelligent sensors have been used in fitness equipment, diets, and health monitoring systems [17]. The future of IoT systems in the health sector leads to the development of personal health monitors that enable early disease detection [18][19] [20] [21].…”
Section: Health Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…Various types of intelligent sensors have been used in fitness equipment, diets, and health monitoring systems [17]. The future of IoT systems in the health sector leads to the development of personal health monitors that enable early disease detection [18][19] [20] [21].…”
Section: Health Monitoringmentioning
confidence: 99%
“…IoT applications at this level will require a lot of coordination with the data abstraction layer and data accumulation. IoT applications vary widely, depending on the application domain and the organization's business processes [18].…”
Section: Layer 6-applicationmentioning
confidence: 99%
“…ough several studies have looked at IoTsecurity, none have focused on DL or ML applications for IoT security. Several works [19][20][21][22][23][24][25] have been reviewed for motivating and organizing the challenges in access control, authentication, application security, encryption, and network security in IoT environments. e survey in [26] provided a survey of IoT communication on security issues with its solutions.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…As a final step, an assessment of current security issues is given along with open challenges and possible future possibilities for IoT security assurance. [6] The dynamic, diverse and connected nature of smart homes creates new security, authentication and privacy challenges. This study explores security risks in smart homes and their impact on system overall security.…”
Section: IIImentioning
confidence: 99%