2018
DOI: 10.1080/23742917.2018.1474592
|View full text |Cite
|
Sign up to set email alerts
|

Security of IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Therefore, it is important to measure the security of these connections. According to Buenrostro et al (2018), transmitting data could give sensitive details about owner's health or religion, just as faulty provision of data confidentiality and integrity could also influence users' privacy as malicious parties can breach personal information without any authorization or consent (Biajain et al 2018;cited by Mikalef et al, 2019). There is a growing concern amongst customers over lack of privacy protection for their data by organizations' data collection methods, especially with respect to the use of tracking technologies, such as cookies and GPS trackers.…”
Section: Privacy Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is important to measure the security of these connections. According to Buenrostro et al (2018), transmitting data could give sensitive details about owner's health or religion, just as faulty provision of data confidentiality and integrity could also influence users' privacy as malicious parties can breach personal information without any authorization or consent (Biajain et al 2018;cited by Mikalef et al, 2019). There is a growing concern amongst customers over lack of privacy protection for their data by organizations' data collection methods, especially with respect to the use of tracking technologies, such as cookies and GPS trackers.…”
Section: Privacy Issuesmentioning
confidence: 99%
“…The above examples highlighted the growing security challenges of internet of things on smart appliances from hardware and software cryptology to operating systems usage across different platforms, which require new regulatory frameworks to tackle (Buenrostro et al 2018).…”
Section: Privacy Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…With rise of this mammoth elevation in number, security has become burning issue and has grabbed a great deal of attention in last few years. Security is important from device to device as it deals with the end-to end communication between individual devices [12]. The strong security is the dire need of IoT due to the rapid rise in IoT devices and cyber-attacks [10].…”
Section: Related Workmentioning
confidence: 99%
“…For hardware-based system, the security components are often not connected to the network to protect them from attacks. Updating these kinds of systems would require a technician to come to update them, or the system would need to be replaced [12]. Similarly, the Intrusion Detection System (IDS) designed for IoT does not support anomaly detection capabilities [78].…”
Section: Rq3 What Are the Available Security Techniques Employed mentioning
confidence: 99%