Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use the Internet to communicate with one another. It is predicted that the IoT will be widely deployed and will find applicability in various domains of life. Demands of IoT h...

Full description

Saved in:
Bibliographic Details
Main Authors: Sufian Hameed, Faraz Idris Khan, Bilal Hameed
Format: Article
Language:English
Published: Wiley 2019-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2019/9629381
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832549691032600576
author Sufian Hameed
Faraz Idris Khan
Bilal Hameed
author_facet Sufian Hameed
Faraz Idris Khan
Bilal Hameed
author_sort Sufian Hameed
collection DOAJ
description Internet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use the Internet to communicate with one another. It is predicted that the IoT will be widely deployed and will find applicability in various domains of life. Demands of IoT have lately attracted huge attention, and organizations are excited about the business value of the data that will be generated by deploying such networks. On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. In this paper, we have identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.
format Article
id doaj-art-e9387b73d98d441a87828e4a3e59b81b
institution Kabale University
issn 2090-7141
2090-715X
language English
publishDate 2019-01-01
publisher Wiley
record_format Article
series Journal of Computer Networks and Communications
spelling doaj-art-e9387b73d98d441a87828e4a3e59b81b2025-02-03T06:10:48ZengWileyJournal of Computer Networks and Communications2090-71412090-715X2019-01-01201910.1155/2019/96293819629381Understanding Security Requirements and Challenges in Internet of Things (IoT): A ReviewSufian Hameed0Faraz Idris Khan1Bilal Hameed2IT Security Lab, Department of Computer Science, National University of Computer and Emerging Sciences (NUCES), Karachi, PakistanIT Security Lab, Department of Computer Science, National University of Computer and Emerging Sciences (NUCES), Karachi, PakistanDepartment of Computer Science, Bahria University, Karachi, PakistanInternet of things (IoT) is realized by the idea of free flow of information amongst various low-power embedded devices that use the Internet to communicate with one another. It is predicted that the IoT will be widely deployed and will find applicability in various domains of life. Demands of IoT have lately attracted huge attention, and organizations are excited about the business value of the data that will be generated by deploying such networks. On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. In this paper, we have identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges.http://dx.doi.org/10.1155/2019/9629381
spellingShingle Sufian Hameed
Faraz Idris Khan
Bilal Hameed
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
Journal of Computer Networks and Communications
title Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
title_full Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
title_fullStr Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
title_full_unstemmed Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
title_short Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
title_sort understanding security requirements and challenges in internet of things iot a review
url http://dx.doi.org/10.1155/2019/9629381
work_keys_str_mv AT sufianhameed understandingsecurityrequirementsandchallengesininternetofthingsiotareview
AT farazidriskhan understandingsecurityrequirementsandchallengesininternetofthingsiotareview
AT bilalhameed understandingsecurityrequirementsandchallengesininternetofthingsiotareview