{"title":"Security Challenges and Solutions in the Internet of Things","authors":"A. Abdullah, Ibrahim Elhenawy, A. Abdelmonem","doi":"10.54216/jisiot.060206","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Intelligent Systems and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54216/jisiot.060206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol