scispace - formally typeset
Open AccessJournal ArticleDOI

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

TLDR
In this article, the authors identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges in the Internet of Things (IoT).
Abstract
Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use the Internet to communicate with one another It is predicted that the IoT will be widely deployed and will find applicability in various domains of life Demands of IoT have lately attracted huge attention, and organizations are excited about the business value of the data that will be generated by deploying such networks On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation In this paper, we have identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.
Journal ArticleDOI

A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective

TL;DR: This article surveys the existing and emerging technologies that can enable this vision for the future of healthcare, particularly, in the clinical practice of healthcare and discusses the emerging directions, open issues, and challenges.
Journal ArticleDOI

An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security

TL;DR: The threats, security requirements, challenges, and the attack vectors pertinent to IoT networks are reviewed, and a novel paradigm that combines a network-based deployment of IoT architecture through software-defined networking (SDN) is proposed.
Journal ArticleDOI

Towards Disaster Resilient Smart Cities: Can Internet of Things and Big Data Analytics Be the Game Changers?

TL;DR: The proposed architecture offers a generic solution for disaster management activities in smart city incentives and the evaluation of the system efficiency is measured in terms of processing time and throughput that demonstrates the performance superiority of the proposed architecture.
Journal ArticleDOI

Reliability in Internet of Things: Current Status and Future Perspectives

TL;DR: This article first identifies reliability challenges posed by specific enabling technologies of each layer of the layered IoT architecture, and presents a systematic synthesis and review of IoT reliability-related literature.
References
More filters
Journal ArticleDOI

Security, privacy and trust in Internet of Things

TL;DR: In this article, the authors present the main research challenges and the existing solutions in the field of IoT security, identifying open issues and suggesting some hints for future research, and suggest some hints to future research.
Journal ArticleDOI

Security in mobile ad hoc networks: challenges and solutions

TL;DR: The security issues related to this problem are identified, the challenges to security design are discussed, and the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel are reviewed.
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Journal ArticleDOI

Inferring Internet denial-of-service activity

TL;DR: In this paper, the authors present a new technique, called backscatter analysis, that provides a conservative estimate of worldwide denial-of-service activity, and quantitatively assess the number, duration and focus of attacks, and qualitatively characterize their behavior.
Journal ArticleDOI

Security and Privacy for Cloud-Based IoT: Challenges

TL;DR: The architecture and unique security and privacy requirements for the next generation mobile technologies on cloud-based IoT are introduced, the inappropriateness of most existing work is identified, and several interesting open problems are suggested with promising ideas to trigger more research efforts in this emerging area.
Related Papers (5)