Internet of Things (IoT) applications security trends and challenges

被引:0
|
作者
Laghari, Asif Ali [1 ]
Li, Hang [1 ]
Khan, Abdullah Ayub [2 ]
Shoulin, Yin [1 ]
Karim, Shahid [3 ]
Khani, Muhammad Adnan Kaim [4 ]
机构
[1] Software College, Shenyang Normal University, Shenyang, China
[2] Department of Computer Science, Bahria University Karachi Campus, Karachi,75000, Pakistan
[3] School of Information Engineering, Xi’an Eurasia University, Shaanxi, Xian,710065, China
[4] Department of Computer Science, Ilma University, Karachi, Pakistan
来源
Discover Internet of Things | 2024年 / 4卷 / 01期
关键词
Internet of Things (IoT); Privacy and security; Cloud computing (CC);
D O I
10.1007/s43926-024-00090-5
中图分类号
学科分类号
摘要
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanisms in light of equipment constraints and novel information transfer techniques, this study attempts to analyze the current architecture of the Internet of Things. After that, we talk about IoT architecture and applications. The following is a list of effective real-time IoT applications that are now in use: Self-driving cars, traffic management systems, smart grids, logistic management hierarchies, environment monitoring, building safety applications, and many more are examples of emerging technologies. Specifically, we highlight the latest improvements and challenges associated with IoT security. Finally, we discuss the state-of-the-art research and its conclusions, as well as the outstanding problems for future IoT security research. © The Author(s) 2024.
引用
收藏
相关论文
共 50 条
  • [11] Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
    Hameed, Sufian
    Khan, Faraz Idris
    Hameed, Bilal
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [12] Special Issue on Security Challenges in Internet of Things (IoT) Preface
    Kesswani, Nishtha
    Gupta, C. P.
    Lin, Frank
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (02) : IV - IV
  • [13] Cultural Heritage on Internet of Things (IoT) systems: Trends and challenges
    Piccialli, Francesco
    Chianese, Angelo
    Jung, Jason J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (11):
  • [14] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [15] Internet of Things (IoT) Security
    Kulkarni, Shivaji
    Durg, Shrihari
    Iyer, Nalini
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 821 - 824
  • [16] A Security Requirements Library for the Development of Internet of Things (IoT) Applications
    Kamalrudin, Massila
    Ibrahim, Asma Asdayana
    Sidek, Safiah
    REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 87 - 96
  • [17] Towards Security on Internet of Things: Applications and Challenges in Technology
    Sadique, Kazi Masum
    Rahmani, Rahim
    Johannesson, Paul
    9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 199 - 206
  • [18] Wearables and the Internet of Things (IoT), Applications, Opportunities, and Challenges: A Survey
    Dian, F. John
    Vahidnia, Reza
    Rahmati, Alireza
    IEEE ACCESS, 2020, 8 : 69200 - 69211
  • [19] Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures
    Mahmoud, Rwan
    Yousuf, Tasneem
    Aloul, Fadi
    Zualkernan, Imran
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 336 - 341
  • [20] CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques
    Alfrhan, Aishah Abdullah
    Alhusain, Reem Hamad
    Alassaf, Mada Abdulrahman
    Alalwi, Hanan Moala
    Elkhediri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,