Internet of Things (IoT) applications security trends and challenges
Abstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanism...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2024-12-01
|
| Series: | Discover Internet of Things |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/s43926-024-00090-5 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846100967613792256 |
|---|---|
| author | Asif Ali Laghari Hang Li Abdullah Ayub Khan Yin Shoulin Shahid Karim Muhammad Adnan Kaim Khani |
| author_facet | Asif Ali Laghari Hang Li Abdullah Ayub Khan Yin Shoulin Shahid Karim Muhammad Adnan Kaim Khani |
| author_sort | Asif Ali Laghari |
| collection | DOAJ |
| description | Abstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanisms in light of equipment constraints and novel information transfer techniques, this study attempts to analyze the current architecture of the Internet of Things. After that, we talk about IoT architecture and applications. The following is a list of effective real-time IoT applications that are now in use: Self-driving cars, traffic management systems, smart grids, logistic management hierarchies, environment monitoring, building safety applications, and many more are examples of emerging technologies. Specifically, we highlight the latest improvements and challenges associated with IoT security. Finally, we discuss the state-of-the-art research and its conclusions, as well as the outstanding problems for future IoT security research. |
| format | Article |
| id | doaj-art-3dd9a763462040d9ade821411b95696a |
| institution | Kabale University |
| issn | 2730-7239 |
| language | English |
| publishDate | 2024-12-01 |
| publisher | Springer |
| record_format | Article |
| series | Discover Internet of Things |
| spelling | doaj-art-3dd9a763462040d9ade821411b95696a2024-12-29T12:41:39ZengSpringerDiscover Internet of Things2730-72392024-12-014112210.1007/s43926-024-00090-5Internet of Things (IoT) applications security trends and challengesAsif Ali Laghari0Hang Li1Abdullah Ayub Khan2Yin Shoulin3Shahid Karim4Muhammad Adnan Kaim Khani5Software College, Shenyang Normal UniversitySoftware College, Shenyang Normal UniversityDepartment of Computer Science, Bahria University Karachi CampusSoftware College, Shenyang Normal UniversitySchool of Information Engineering, Xi’an Eurasia UniversityDepartment of Computer Science, Ilma UniversityAbstract The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilities related to IoT-enabled devices, as well as potential assurance mechanisms in light of equipment constraints and novel information transfer techniques, this study attempts to analyze the current architecture of the Internet of Things. After that, we talk about IoT architecture and applications. The following is a list of effective real-time IoT applications that are now in use: Self-driving cars, traffic management systems, smart grids, logistic management hierarchies, environment monitoring, building safety applications, and many more are examples of emerging technologies. Specifically, we highlight the latest improvements and challenges associated with IoT security. Finally, we discuss the state-of-the-art research and its conclusions, as well as the outstanding problems for future IoT security research.https://doi.org/10.1007/s43926-024-00090-5Internet of Things (IoT)Privacy and securityCloud computing (CC) |
| spellingShingle | Asif Ali Laghari Hang Li Abdullah Ayub Khan Yin Shoulin Shahid Karim Muhammad Adnan Kaim Khani Internet of Things (IoT) applications security trends and challenges Discover Internet of Things Internet of Things (IoT) Privacy and security Cloud computing (CC) |
| title | Internet of Things (IoT) applications security trends and challenges |
| title_full | Internet of Things (IoT) applications security trends and challenges |
| title_fullStr | Internet of Things (IoT) applications security trends and challenges |
| title_full_unstemmed | Internet of Things (IoT) applications security trends and challenges |
| title_short | Internet of Things (IoT) applications security trends and challenges |
| title_sort | internet of things iot applications security trends and challenges |
| topic | Internet of Things (IoT) Privacy and security Cloud computing (CC) |
| url | https://doi.org/10.1007/s43926-024-00090-5 |
| work_keys_str_mv | AT asifalilaghari internetofthingsiotapplicationssecuritytrendsandchallenges AT hangli internetofthingsiotapplicationssecuritytrendsandchallenges AT abdullahayubkhan internetofthingsiotapplicationssecuritytrendsandchallenges AT yinshoulin internetofthingsiotapplicationssecuritytrendsandchallenges AT shahidkarim internetofthingsiotapplicationssecuritytrendsandchallenges AT muhammadadnankaimkhani internetofthingsiotapplicationssecuritytrendsandchallenges |