{"title":"IoT security threats analysis based on components, layers and devices","authors":"I. Alsmadi, Fahad Mira","doi":"10.15864/ajse.1101","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security\n threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT\n vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain,\n category or threats.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"65 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American journal of engineering, science and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15864/ajse.1101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security
threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT
vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain,
category or threats.