Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions

被引:6
|
作者
Khadam, Umair [1 ]
Iqbal, Muhammad Munwar [1 ]
Alruily, Meshrif [2 ]
Al Ghamdi, Mohammed A. [3 ]
Ramzan, Muhammad [3 ]
Almotiri, Sultan H. [4 ]
机构
[1] Univ Engn & Technol, Dept Comp Sci, Taxila 47050, Pakistan
[2] Jouf Univ, Fac Comp & Informat Sci, Sakaka City, Saudi Arabia
[3] Umm Al Qura Univ, Dept Comp Sci, Makkah City, Saudi Arabia
[4] Univ Sargodha, Dept Comp Sci & IT, Sargodha, Pakistan
关键词
WATERMARKING TECHNIQUE; ALGORITHM; SCHEME; PROTECTION; MARKING;
D O I
10.1155/2020/7105625
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes, hospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for IoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to cater the user's demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all those benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed, reproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers, legal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are essential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright protection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security challenges, IoT device limitations, and future research directions in the area of text watermarking.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Authentications for Internet of Things Security: Threats, Challenges and Studies
    Moon, Seo Yeon
    Park, Jin Ho
    Park, Jong Hyuk
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02): : 349 - 358
  • [22] Toward Privacy Preserving Federated Learning in Internet of Vehicular Things: Challenges and Future Directions
    Abdel-Basset, Mohamed
    Hawash, Hossam
    Moustafa, Nour
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 56 - 66
  • [23] A decentralized approach for Security and Privacy challenges in the Internet of Things
    Skarmeta, Antonio F.
    Hernandez-Ramos, Jose L.
    Victoria Moreno, M.
    [J]. 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 67 - 72
  • [24] Security and Privacy of Internet of Things: A Review of Challenges and Solutions
    Lu, Yujing
    [J]. Journal of Cyber Security and Mobility, 2023, 12 (06): : 813 - 844
  • [25] A Review on Security and Privacy Issues and Challenges in Internet of Things
    Alferidah, Dhuha Khalid
    Jhanjhi, N. Z.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 263 - 285
  • [26] On the features and challenges of security and privacy in distributed internet of things
    Roman, Rodrigo
    Zhou, Jianying
    Lopez, Javier
    [J]. COMPUTER NETWORKS, 2013, 57 (10) : 2266 - 2279
  • [27] ASSESSING THE SERVICES, SECURITY THREATS, CHALLENGES AND SOLUTIONS IN THE INTERNET OF THINGS
    Zahra, Syed Rameem
    Chishti, Mohammad Ahsan
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (03): : 457 - 484
  • [28] Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications
    Khan, Yasser
    Su'ud, Mazliham Bin Mohd
    Alam, Muhammad Mansoor
    Ahmad, Sayed Fayaz
    Salim, Nur Agus
    Khan, Nasir
    [J]. ELECTRONICS, 2023, 12 (01)
  • [29] The Security of Internet of Things: Current State and Future Directions
    Dahabiyeh, Laila
    [J]. INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 414 - 420
  • [30] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    [J]. COMPUTERS, 2020, 9 (02)