Internet of Things (IoT) applications security trends and challenges

Abstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanism...

Full description

Saved in:
Bibliographic Details
Main Authors: Asif Ali Laghari, Hang Li, Abdullah Ayub Khan, Yin Shoulin, Shahid Karim, Muhammad Adnan Kaim Khani
Format: Article
Language:English
Published: Springer 2024-12-01
Series:Discover Internet of Things
Subjects:
Online Access:https://doi.org/10.1007/s43926-024-00090-5
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846100967613792256
author Asif Ali Laghari
Hang Li
Abdullah Ayub Khan
Yin Shoulin
Shahid Karim
Muhammad Adnan Kaim Khani
author_facet Asif Ali Laghari
Hang Li
Abdullah Ayub Khan
Yin Shoulin
Shahid Karim
Muhammad Adnan Kaim Khani
author_sort Asif Ali Laghari
collection DOAJ
description Abstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanisms in light of equipment constraints and novel information transfer techniques, this study attempts to analyze the current architecture of the Internet of Things. After that, we talk about IoT architecture and applications. The following is a list of effective real-time IoT applications that are now in use: Self-driving cars, traffic management systems, smart grids, logistic management hierarchies, environment monitoring, building safety applications, and many more are examples of emerging technologies. Specifically, we highlight the latest improvements and challenges associated with IoT security. Finally, we discuss the state-of-the-art research and its conclusions, as well as the outstanding problems for future IoT security research.
format Article
id doaj-art-3dd9a763462040d9ade821411b95696a
institution Kabale University
issn 2730-7239
language English
publishDate 2024-12-01
publisher Springer
record_format Article
series Discover Internet of Things
spelling doaj-art-3dd9a763462040d9ade821411b95696a2024-12-29T12:41:39ZengSpringerDiscover Internet of Things2730-72392024-12-014112210.1007/s43926-024-00090-5Internet of Things (IoT) applications security trends and challengesAsif Ali Laghari0Hang Li1Abdullah Ayub Khan2Yin Shoulin3Shahid Karim4Muhammad Adnan Kaim Khani5Software College, Shenyang Normal UniversitySoftware College, Shenyang Normal UniversityDepartment of Computer Science, Bahria University Karachi CampusSoftware College, Shenyang Normal UniversitySchool of Information Engineering, Xi’an Eurasia UniversityDepartment of Computer Science, Ilma UniversityAbstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanisms in light of equipment constraints and novel information transfer techniques, this study attempts to analyze the current architecture of the Internet of Things. After that, we talk about IoT architecture and applications. The following is a list of effective real-time IoT applications that are now in use: Self-driving cars, traffic management systems, smart grids, logistic management hierarchies, environment monitoring, building safety applications, and many more are examples of emerging technologies. Specifically, we highlight the latest improvements and challenges associated with IoT security. Finally, we discuss the state-of-the-art research and its conclusions, as well as the outstanding problems for future IoT security research.https://doi.org/10.1007/s43926-024-00090-5Internet of Things (IoT)Privacy and securityCloud computing (CC)
spellingShingle Asif Ali Laghari
Hang Li
Abdullah Ayub Khan
Yin Shoulin
Shahid Karim
Muhammad Adnan Kaim Khani
Internet of Things (IoT) applications security trends and challenges
Discover Internet of Things
Internet of Things (IoT)
Privacy and security
Cloud computing (CC)
title Internet of Things (IoT) applications security trends and challenges
title_full Internet of Things (IoT) applications security trends and challenges
title_fullStr Internet of Things (IoT) applications security trends and challenges
title_full_unstemmed Internet of Things (IoT) applications security trends and challenges
title_short Internet of Things (IoT) applications security trends and challenges
title_sort internet of things iot applications security trends and challenges
topic Internet of Things (IoT)
Privacy and security
Cloud computing (CC)
url https://doi.org/10.1007/s43926-024-00090-5
work_keys_str_mv AT asifalilaghari internetofthingsiotapplicationssecuritytrendsandchallenges
AT hangli internetofthingsiotapplicationssecuritytrendsandchallenges
AT abdullahayubkhan internetofthingsiotapplicationssecuritytrendsandchallenges
AT yinshoulin internetofthingsiotapplicationssecuritytrendsandchallenges
AT shahidkarim internetofthingsiotapplicationssecuritytrendsandchallenges
AT muhammadadnankaimkhani internetofthingsiotapplicationssecuritytrendsandchallenges