Security and Internet of Things: Benefits, Challenges, and Future Perspectives

被引:18
作者
Taherdoost, Hamed [1 ,2 ]
机构
[1] Univ Canada West, Dept Arts Commun & Social Sci, Vancouver, BC V6B 1V9, Canada
[2] Hamta Business Corp, Res & Dev Dept, Hamta Grp, Vancouver, BC V6E 1C9, Canada
关键词
Internet of Things; security; data security; network security; INTRUSION DETECTION; IOT DEVICES; NETWORK; PRIVACY; CLOUD; AUTHENTICATION; LIGHTWEIGHT; THREATS; SCHEME;
D O I
10.3390/electronics12081901
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. IoT security is a protection strategy and defense mechanism that protects against the possibility of cyberattacks that specifically target physically linked IoT devices. IoT security teams are currently dealing with growing difficulties, such as inventories, operations, diversity, ownership, data volume, threats, etc. This review examines research on security and IoT with a focus on the situation, applications, and issues of the present as well as the potential for the future. IoT network security has received greater attention from interdisciplinary and geographically scattered researchers in recent years. Data integrity, secrecy, authentication, and authorization should be guaranteed due to the large amount of data that flows across network devices. However, the area of IoT security still has a lot of room for growth.
引用
收藏
页数:22
相关论文
共 85 条
  • [1] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    [J]. IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [2] Factors Affecting Students' Performance in Higher Education: A Systematic Review of Predictive Data Mining Techniques
    Abu Saa, Amjed
    Al-Emran, Mostafa
    Shaalan, Khaled
    [J]. TECHNOLOGY KNOWLEDGE AND LEARNING, 2019, 24 (04) : 567 - 598
  • [3] Security in Internet of Things: issues, challenges, taxonomy, and architecture
    Adat, Vipindev
    Gupta, B. B.
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (03) : 423 - 441
  • [4] Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications
    Ahmed, Mohammed Imtyaz
    Kannan, G.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2021, 20
  • [5] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [6] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [7] Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa
    Derhab, Abdelouahid
    Emam, Ahmed Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189 (189)
  • [8] An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata
    Ali, Fasila
    Mathew, Sheena
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [9] An Advanced Algorithm for Higher Network Navigation in Social Internet of Things Using Small-World Networks
    Amin, Farhan
    Abbasi, Rashid
    Rehman, Abdul
    Choi, Gyu Sang
    [J]. SENSORS, 2019, 19 (09)
  • [10] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27