2022
DOI: 10.1109/access.2022.3209355
|View full text |Cite
|
Sign up to set email alerts
|

Security in Internet of Things: A Review

Abstract: Internet of Things (IoT) is the paramount virtual network that enables remote users to access connected multimedia devices. It has dragged the attention of the community because it encompasses realworld scenarios with implicit environs. Despite several beneficial aspects, IoT is surrounded by provocations for successful implementation, as data travels in different layers. One of the critical challenges is the security of the data in these layers. Researchers conducted numerous studies focused on the level of s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 239 publications
(165 reference statements)
0
13
0
Order By: Relevance
“…From the first derivative in (30), it is a decreasing function of bandwidth ℬ 𝓃 . The second derivative in (31) * is a convex function that can be solved by using the Karush-Kuhn-Tucker conditions [7], [33], [34], [39]. By introducing Lagrange multipliers Ѵ in (29), this is:…”
Section: St (15b) (15d) (15f ) (28)mentioning
confidence: 99%
See 1 more Smart Citation
“…From the first derivative in (30), it is a decreasing function of bandwidth ℬ 𝓃 . The second derivative in (31) * is a convex function that can be solved by using the Karush-Kuhn-Tucker conditions [7], [33], [34], [39]. By introducing Lagrange multipliers Ѵ in (29), this is:…”
Section: St (15b) (15d) (15f ) (28)mentioning
confidence: 99%
“…From (39), the convex function 𝜎 𝓃 (ѱ) = 𝜗 𝓃 (𝒪 𝓃 (ѱ)) is obtained by taking the first and second derivatives of (43) and (44). From (43), the optimal ѱ * is obtained by taking the first derivative ƴ ′ (ѱ) = − 𝒵 𝓃 ѱ 2 ≤ 0 ⁄ , and also the second derivative is ƴ ′′ (ѱ) = 2 𝒵 𝓃 ѱ 3 ≥ 0 ⁄ .…”
Section: S T (15a) − (15h) (35a)mentioning
confidence: 99%
“…This threat increases with enhancements in technological developments where people get trained and misuse their skills due to a lack of expertise. 14 Towards this end, if blockchain is used as a place to carry and store messages across, then there is increased protection against tampering with original messages due to its immutability aspect. 15 Hence, efforts in the direction of ply compatibility against the version of the software being chosen to build the application using emerging domains serve to be the need of the hour.…”
Section: Related Workmentioning
confidence: 99%
“…This causes the opponent forces to creep into the secret mission and ruin it. This threat increases with enhancements in technological developments where people get trained and misuse their skills due to a lack of expertise 14 . Towards this end, if blockchain is used as a place to carry and store messages across, then there is increased protection against tampering with original messages due to its immutability aspect 15 .…”
Section: Related Workmentioning
confidence: 99%
“…These components are often not tested for existing vulnerabilities or enforcement of stateof-the-art security standards [2]. The consequence of these IoT vulnerabilities has resulted in compromise by adversaries affecting IoT devices from video cameras and smart locks to industrial safety systems [1], [3], [4], resulting in incidents of large-scale Distributed Denial-of-Service (DDoS) attacks [3], [5], [6]. Although the availability of security solutions in the market is rapidly increasing, without the enforcement of these mechanism within devices, the improvement in the security posture of IoT devices cannot be guaranteed.…”
Section: Introductionmentioning
confidence: 99%