Internet of Things (IoT) Security and Private Concerns: An Overview

Y. O. Mosud, E. Ajulo, A. Yinusa
{"title":"Internet of Things (IoT) Security and Private Concerns: An Overview","authors":"Y. O. Mosud, E. Ajulo, A. Yinusa","doi":"10.22624/aims/csean-smart2023p7","DOIUrl":null,"url":null,"abstract":"The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7","PeriodicalId":409325,"journal":{"name":"Advances in Multidisciplinary and scientific Research Journal Publication","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Multidisciplinary and scientific Research Journal Publication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22624/aims/csean-smart2023p7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7
物联网(IoT)安全和隐私问题:概述
在过去的二十年中,物联网(IoT)应用的数量大大增加。全球有超过5亿个电子设备连接在一起。由于物联网与互联网的持续连接,物联网应用程序经常成为各种传统威胁的目标,例如特洛伊木马、蠕虫、恶意软件、间谍软件和恶意代码注入。很明显,传统威胁提供诸如问责制、授权、身份验证之类的服务,这些因素通常用于识别主题并确定该人是否有资格访问对象。随着大量连接设备的出现,物联网系统可能更容易受到高频电磁辐射和更高级病毒的威胁和攻击。因此,迫切需要解决这些隐私和安全问题,因为依靠目前使用的传统程序是不够的。本研究通过探索物联网设备容易受到的各种危险、这些危险如何运作并创建恢复机制来减轻危害,确定了该领域的知识和研究空白。该研究最后提出了一些先进的身份验证方法,如一次性密码(OTP)基于ID和密码、三因素/多因素和区块链。Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B.(2023):物联网(IoT)安全与隐私问题:概述。尼日利亚网络安全会议论文集。尼日利亚陆军资源中心(NARC),尼日利亚阿布贾,2023年7月11日至12日。第49-58页https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信