2021
DOI: 10.1155/2021/5579148
|View full text |Cite
|
Sign up to set email alerts
|

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Abstract: Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 219 publications
0
4
0
Order By: Relevance
“…As the prevalence of key loggers has increased, numerous new attachment mechanisms have evolved. The report's author said that defending key human and commercial systems demands the most up-to-date knowledge of cyber security's threats and weaknesses (Rani et al, 2021). There are numerous open and hidden sources of information regarding these threats, including the National Vulnerability Database, CERT alerts, blog posts, social media, and black websites.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…As the prevalence of key loggers has increased, numerous new attachment mechanisms have evolved. The report's author said that defending key human and commercial systems demands the most up-to-date knowledge of cyber security's threats and weaknesses (Rani et al, 2021). There are numerous open and hidden sources of information regarding these threats, including the National Vulnerability Database, CERT alerts, blog posts, social media, and black websites.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Users have little control over the setup or functionality of the gadgets they employ. It is well-known that only a small number of individuals possess the skills necessary to efficiently control or manage cyber warfare (Rani et al, 2021). The cyber realm is too enormous to be mastered by a single person or organization, even if they devote their entire life and acquire unfathomable amounts of specialized knowledge.…”
Section: Introductionmentioning
confidence: 99%
“…Statista.com estimated that the sum of IoT-connected devices will be 30.9 billion units worldwide by 2025 (Statista, 2021). These devices are heterogeneous having different manufacturers, protocols, specifications, and command interfaces with no existing standard followed; thus opening up the entire IoT system to threats and attacks (Rani et al, 2021). While existing threats are easier to manage, emerging threats consist of different combinations of known threats and are therefore dynamic and more challenging.…”
Section: *Corresponding Authormentioning
confidence: 99%
“…Each layer of the IoT suffers from at least one of these attacks. All layers of IoT suffers from DoS attacks, which prevent access to the network [ 2 ].…”
Section: Introductionmentioning
confidence: 99%