2017
DOI: 10.1007/978-3-319-50758-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges of the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 29 publications
0
21
0
Order By: Relevance
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…Detailed surveys on applications of IoT are in [18][19][20]. Studies on general threats and vulnerabilities of IoT includes [21][22][23][24]. Due to the sizable potential of Internet of Things there is need to analyze the potential security challenges such as malware.…”
Section: Introductionmentioning
confidence: 99%
“…A MDS monitors network data to match observed activities against an existing blacklist. Nevertheless, although it produces high detection rates and low false positive rates, it cannot identify any zeroday attacks or even variants of known ones [5]. Conversely, an ADS establishes a normal profile and discovers any variation from it as an attack.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Cloud's vulnerabilities expose the confidentiality, integrity or/and availability of its resources. This is because that data and virtualised infrastructure of cloud systems can be breached by existing and new attacks [5]. The security challenge of a cloud computing system occurs when a cloud runs a high storage capacity and computing power that is abused by an insider or outsider hacker [6].…”
Section: Introductionmentioning
confidence: 99%
“…Samaila et al [46] proposed an extensive analysis of security challenges of IoT. In this study the authors considered several issues including implementation of security in IoT, resource limitations, heterogeneity of IoT environments, applications and devices, security awareness of the users and maintenance of security after deployment.…”
Section: Related Workmentioning
confidence: 99%