2022
DOI: 10.1109/access.2022.3205351
|View full text |Cite
|
Sign up to set email alerts
|

Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions

Abstract: Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as the Internet of Things (IoT), promise enhanced quality of life, greater business opportunities, cost-effective manufacturing, and efficient operation management through ubiquitous connectivity and deployment of smart physical objects. IoT networks are able to collect, preprocess, and transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 167 publications
0
6
0
Order By: Relevance
“…Temporary Disabling Attack (TDA) [50,51] The malware injected into an IoT system by an attacker can compromise its integrity and allow for the theft of sensitive information or the implementation of additional attacks. Furthermore, if vendors do not guarantee proper software protection, certain systems might be compromised with viruses' right out of the box.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Temporary Disabling Attack (TDA) [50,51] The malware injected into an IoT system by an attacker can compromise its integrity and allow for the theft of sensitive information or the implementation of additional attacks. Furthermore, if vendors do not guarantee proper software protection, certain systems might be compromised with viruses' right out of the box.…”
Section: Attack Portrayal Purposementioning
confidence: 99%
“…Another works [35,4,78,44,125] predominantly focus on communication protocols and security in IoT. Gerodimos et al [35] discuss the fundamentals of IoT architecture and present an analysis of security threats.…”
Section: Related Iot Surveysmentioning
confidence: 99%
“…Gerodimos et al [35] discuss the fundamentals of IoT architecture and present an analysis of security threats. Abbasi [4] et al and Nebbione and Calzarossa [78] delve deep into security requirements, threats, and countermeasures in the IoT application layer. Schmitz and Sto-janovié [44] delve into the application of formal methods to IoT, specifically focusing on MQTT and CoAP protocols.…”
Section: Related Iot Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…Within the IoT architecture, the application layer resides at the top level. This layer provides the user interface, which includes services such as healthcare, smart homes, and connected cars [125], [126]. It recognizes spam and filters out the malicious content [127].…”
Section: ) Application Layermentioning
confidence: 99%