Internet of Things Applications: Opportunities and Threats

被引:42
|
作者
Rahmani, Amir Masoud [1 ]
Bayramov, Suleyman [2 ]
Kiani Kalejahi, Behnam [2 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, 123 Univ Rd,Sect 3, Touliu 64002, Yunlin, Taiwan
[2] Khazar Univ, Dept Comp Sci, Baku, Azerbaijan
关键词
Internet of things; Smart manufacturing; Industrial IoT; Future technology; Threats; INTEGRATED-SYSTEM; IOT;
D O I
10.1007/s11277-021-08907-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the century of automation, which is digitized, and more and more technology is used, automatic systems' replacement of old manual systems makes people's lives easier. Nowadays, people have made the Internet an integral part of humans' daily lives unless they are insecure. The Internet of Things (IoT) secures a platform that authorizes devices and sensors to be remotely detected, connected, and controlled over the Internet. Due to the developments in sensor technologies, the production of tiny and low-cost sensors has increased. Many sensors, such as temperature, pressure, vibration, sound, light, can be used in the IoT. As a result of the development of these sensors with new generations, the power of the IoT technology increases, and accordingly, the revolution of IoT applications are developing rapidly. Therefore, their security issues and threats are challenging topics. In this paper, the benefits and open issues, threats, limitations of IoT applications are presented. The assessment shows that the most influential factor for evaluating IoT applications is the cost that is used in 79% of all articles, then the real-time-ness that is used in 64%, and security and error are used in 57% of all reviewed articles.
引用
收藏
页码:451 / 476
页数:26
相关论文
共 50 条
  • [1] Internet of Things Applications: Opportunities and Threats
    Amir Masoud Rahmani
    Suleyman Bayramov
    Behnam Kiani Kalejahi
    Wireless Personal Communications, 2022, 122 : 451 - 476
  • [2] Study of the Different Security Threats on the Internet of Things and their Applications
    Sahmi, Imane
    Mazri, Tomader
    Hmina, Nabil
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [3] Survey on Security Threats of Smartphones in Internet of Things
    Khan, Muhammad Hassam
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 561 - 566
  • [4] On the Application of IOT (Internet of Things) for Securing Industrial Threats
    Usman, Muhammad
    Abbas, Nazar
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 37 - 40
  • [5] Privacy in the Internet of Things: threats and challenges
    Ziegeldorf, Jan Henrik
    Morchon, Oscar Garcia
    Wehrle, Klaus
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2728 - 2742
  • [6] Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats
    Smail, Boussaadi
    Sanchez, Domenic T.
    Peconcillo, Larry B., Jr.
    De Vera, John V.
    Horteza, Al D.
    Jawarneh, Malik
    Meenakshi
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (03): : 690 - 701
  • [7] Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications
    Balogun, Mobolarinwa
    Bahsi, Hayretdin
    Karabacak, Bilge
    TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 49 - 58
  • [8] Opportunities and challenges of the Internet of Things
    Nicolae, Cristina-Andreea
    Rosca, Mihai Ioan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2021, 15 (01): : 1069 - 1082
  • [9] Data Dissemination Techniques for Internet of Things Applications: Research Challenges and Opportunities
    Lenando, Halikul bin
    Albert, Sanjay Charles
    Alrfaay, Mohamad
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2024, 49 (04) : 323 - 353
  • [10] Threats to Journalists from the Consumer Internet of Things
    Shere, Anjuli R. K.
    Nurse, Jason R. C.
    Martin, Andrew
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 303 - 326