Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

被引:0
作者
Alanezi, Mohammed Ateeq [1 ]
机构
[1] Univ Hafr Al Batin, Coll Comp Sci & Engn, Hafar al Batin, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2022年 / 22卷 / 02期
关键词
Internet of Things; Cyber security; Artificial intelligence (AI); Information technology; Networks;
D O I
10.22937/IJCSNS.2022.22.2.20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.
引用
收藏
页码:153 / 158
页数:6
相关论文
共 25 条
[1]  
Aldaej A., 2019, IEEE Access, DOI [DOI 10.1109/ACCESS.2019.2893445, 10.1109/access.2019.2893445]
[2]   A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer .
COMPUTING, 2019, 101 (07) :791-818
[3]   Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges [J].
Babaei, Armin ;
Schiele, Gregor .
SENSORS, 2019, 19 (14)
[4]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12
[5]   A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective [J].
Chen, Shanzhi ;
Xu, Hui ;
Liu, Dake ;
Hu, Bo ;
Wang, Hucheng .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04) :349-359
[6]   Modeling and Analysis of IoT Energy Resource Exhaustion Attacks [J].
Desnitsky, Vasily ;
Kotenko, Igor .
INTELLIGENT DISTRIBUTED COMPUTING XI, 2018, 737 :263-270
[7]   Misuse-based detection of Z-Wave network attacks [J].
Fuller, Jonathan D. ;
Ramsey, Benjamin W. ;
Rice, Mason J. ;
Pecarina, John M. .
COMPUTERS & SECURITY, 2017, 64 :44-58
[8]  
Fuller JD, 2015, 2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), P734, DOI 10.1109/LCNW.2015.7365922
[9]  
Gritzalis D., 2021, ADV CORE COMPUTER SC
[10]   Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports [J].
Keskin, Omer F. ;
Caramancion, Kevin Matthe ;
Tatar, Irem ;
Raza, Owais ;
Tatar, Unal .
ELECTRONICS, 2021, 10 (10)