Loading [MathJax]/extensions/MathZoom.js
Security in Internet of Things: A Review | IEEE Journals & Magazine | IEEE Xplore

Security in Internet of Things: A Review


The goal of this study is to thoroughly analyze security concerns, wireless communication methods, and loT security technologies. The paper addresses all security, in-dep...

Abstract:

Internet of Things (IoT) is the paramount virtual network that enables remote users to access connected multimedia devices. It has dragged the attention of the community ...Show More

Abstract:

Internet of Things (IoT) is the paramount virtual network that enables remote users to access connected multimedia devices. It has dragged the attention of the community because it encompasses real-world scenarios with implicit environs. Despite several beneficial aspects, IoT is surrounded by provocations for successful implementation, as data travels in different layers. One of the critical challenges is the security of the data in these layers. Researchers conducted numerous studies focusing on the level of security at a single technique, creating loopholes to address the entire scenario of securing an IoT network. This study aims to comprehensively review current security issues, wireless communication techniques, and technologies for securing IoT. This work’s utmost significance is addressing all the security perspectives at a glance. For this purpose, research contributions from the previous years are investigated for better understanding. Some countermeasures and snags from security perspectives have also been analyzed in detail concerning the current industry trends. Blockchain, machine learning, fog, and edge computing are possible solutions to secure IoT. After studying these techniques and their immunity to attacks, machine learning can become a hope if incorporated with end-to-end security. This comprehensive review will provide adequate understanding and knowledge in defining security lines of action for the successful implementation of IoT.
The goal of this study is to thoroughly analyze security concerns, wireless communication methods, and loT security technologies. The paper addresses all security, in-dep...
Published in: IEEE Access ( Volume: 10)
Page(s): 104649 - 104670
Date of Publication: 26 September 2022
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.