2023
DOI: 10.3390/electronics12081901
|View full text |Cite
|
Sign up to set email alerts
|

Security and Internet of Things: Benefits, Challenges, and Future Perspectives

Abstract: Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. IoT security is a protection strategy and defense mechanism that protects against the possibility of cyberattacks that specifically target physically linked IoT devices. IoT security teams are currently dealing with growing difficulties, such as inventories, operations, diversity, own… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 73 publications
0
13
0
Order By: Relevance
“…The Internet has also shown many cyberattacks or attacks on its networks. Network security is critical because, as the Internet develops, enemies' attack strategies likewise change [12,13].…”
Section: Conceptsmentioning
confidence: 99%
“…The Internet has also shown many cyberattacks or attacks on its networks. Network security is critical because, as the Internet develops, enemies' attack strategies likewise change [12,13].…”
Section: Conceptsmentioning
confidence: 99%
“…They particularly underscore the imperative for robust policy enforcement and effective governance of sensitive data [24,26,29]. Finally, education and training management played a massively important role in understanding how to assess the risks associated with changes in data privacy issues, as evidenced by studies on privacy ethics [30,31], explorations in the continuous learning process, models, and frameworks [27,28,32], as well as education assets, which encompassed gaps, challenges, and directions [10,11,15,16,18,26,32,33,34,35,36]. These findings resulted in insights into factors, subfactors, and issues from management perspectives, as shown in Table 3.…”
Section: Data Privacy On Management Perspectivesmentioning
confidence: 99%
“…Education Assets [24], [43] SStudy Personal Privacy Assistant Security Awareness and Training Education Assets [10][11][12][13][14][15][16][17][18], [26], [32][33][34][35][36] The study continues on privacy challenges and directions.…”
Section: Privacy and Compliance Education Security Awareness And Trai...mentioning
confidence: 99%
See 1 more Smart Citation
“…The ubiquity of Arduino especially for Node MCU ESP8266 has been to be a main component that always used among hobbies, academics, and industries to develop many projects related to IoT devices [18] [19]. The microcontroller of ESP8266 has also equipped with wireless communication protocol that can be used to communicate with other devices and other infrastructure [19]. A comparison of several famous programming languages, namely C, Java, Python, and MATLAB has been conducted by Cubukcu et al [20].…”
Section: Study Literaturementioning
confidence: 99%