2020
DOI: 10.1016/j.jnca.2020.102779
|View full text |Cite
|
Sign up to set email alerts
|

Security in product lifecycle of IoT devices: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(20 citation statements)
references
References 102 publications
0
20
0
Order By: Relevance
“…But, the use of IoT opens the door for cyberattacks; Cybersecurity has become one of the most relevant IoT fields with the increasing possibility of cyberattacks. IoT security aims to reduce cybersecurity risk to organizations and users by protecting IoT assets and privacy by various technologies and protocols [38], which cannot be overlooked by all those interested in this field.…”
Section: A Related Workmentioning
confidence: 99%
“…But, the use of IoT opens the door for cyberattacks; Cybersecurity has become one of the most relevant IoT fields with the increasing possibility of cyberattacks. IoT security aims to reduce cybersecurity risk to organizations and users by protecting IoT assets and privacy by various technologies and protocols [38], which cannot be overlooked by all those interested in this field.…”
Section: A Related Workmentioning
confidence: 99%
“…The progression of information technology (IT) such as IoT and organizations' growing reliance on IT continually increases concerns regarding information security. Focusing on the concerns for IoT specifically, the security risks in IoT devices has risen and become critical over the last decade as studied by [11] and illustrated in Figure 1.…”
Section: Impact Of Iot Implementation In Smart Cities Towards Informamentioning
confidence: 99%
“…Figure 1: Evolution of Security Challenges in IoT Devices [11] Other than that, an SC that adopts IoT technologies presents threats to the protection and privacy of both citizens and the government. This is because, security issues related to the information generated in an SC lead to the relationships and personal protection of citizens.…”
Section: • Issues In Information System Security Management In Smart mentioning
confidence: 99%
“…In [10,30,31], the security requirements of IoT services or IoT environments are classified in various ways in terms of physical security and service security, communication security, and data security during communication. Since the method proposed in this paper is particularly focused on the security of personal information within IoT devices in the IoT environment, we classify and analyze the following requirements accordingly.…”
Section: Security Requirements For the Lifecycle Of Personal Informationmentioning
confidence: 99%