2023
DOI: 10.1007/978-3-031-22356-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Security of IoT Application Layer: Requirements, Threats, and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 66 publications
0
6
0
Order By: Relevance
“…Measures such as data validation, digital signatures, and audit trails help maintain data integrity and prevent unauthorized modification [201]- [207]. Availability: Ensuring that the civil registration system and its services are accessible and operational when needed [208], [209]. Measures like redundant systems, disaster recovery plans, and regular maintenance and monitoring are implemented to minimize downtime and ensure system availability.…”
Section: Model Discussionmentioning
confidence: 99%
“…Measures such as data validation, digital signatures, and audit trails help maintain data integrity and prevent unauthorized modification [201]- [207]. Availability: Ensuring that the civil registration system and its services are accessible and operational when needed [208], [209]. Measures like redundant systems, disaster recovery plans, and regular maintenance and monitoring are implemented to minimize downtime and ensure system availability.…”
Section: Model Discussionmentioning
confidence: 99%
“…Advanced technologies within this layer, such as ML algorithms and predictive analytics, drive precision farming, optimizing resource allocation crop management, and fostering sustainable agricultural practices [71]. The application layer processes information and makes critical decisions [72]. It closely integrates IoT technology with agricultural production, utilizing data analysis from the connectivity layer [73].…”
Section: ) Application Layermentioning
confidence: 99%
“…[1], [64], [72], [521]- [527] Location Privacy: track the location of farming equipment, livestock, Unauthorized access to precise location data Robust privacy-preserving mechanisms and compliance with privacy regulations, ethical use of location data.…”
Section: B Data Privacy and Confidentialitymentioning
confidence: 99%
“…A secure communication route between devices and the prevention of malevolent devices from jeopardizing network security are both made possible by trust management. Detection of malevolent nodes [4], that can compromise network security by engaging in malicious activities including eavesdropping [5], tampering with data [6], and launching denial-of-service attacks [7], is one of the primary issues in trust management for IoT networks [8]. Numerous trust management strategies, including reputation-based systems [9], cryptographic methods [10], and machine learning-based methods, have been proposed as solutions to these research challenges.…”
Section: Introductionmentioning
confidence: 99%