2021
DOI: 10.1007/s42452-021-04156-9
|View full text |Cite
|
Sign up to set email alerts
|

Security trends in Internet of Things: a survey

Abstract: The Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The purpose of this study is to explore discrete IoT security challenges pertaining to currently deployed IoT standards and protocols. We have presented a detailed review in this study that focuses on IoT's imminent security aspects, covering identification of risks pertaining to the current IoT system, novel security protocols, and securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(22 citation statements)
references
References 51 publications
0
9
0
1
Order By: Relevance
“…The attacker has the original message and hash of the message. The attacker tries to create the same hash of two different messages from (5).…”
Section: Iot-blockchain-light-weight Cryptography Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacker has the original message and hash of the message. The attacker tries to create the same hash of two different messages from (5).…”
Section: Iot-blockchain-light-weight Cryptography Proposed Approachmentioning
confidence: 99%
“…The processing load for processing the information is always increased by maintaining such procedures with high encryption at the edge devices. Another issue could develop because of the heterogeneity [5] in the environment, particularly with low-power devices that are not equipped with internal clocks and cause problems with time synchronization. This is especially true when the blockchain network is integrated because relies on real-time clock synchronization.…”
Section: Introductionmentioning
confidence: 99%
“…Due to page limitations, we are not able to summarize them all here. However, in Rachit, et al, 159 the authors present a detailed survey on security‐specific comparative analysis of protocols, standards, and proffered security models for IoT security requirements.…”
Section: Delivering Qos In Iot Networkmentioning
confidence: 99%
“…IoT has also been used in healthcare, transportation, agriculture, smart-city, retail, etc. Security of the IoT has received considerable attention from multiple stakeholders [25]. The legacy access control techniques (RBAC, CapBAC, and ABAC) are unfit for IoT [24].…”
Section: References Yearmentioning
confidence: 99%