IoT security threats analysis based on components, layers and devices

I. Alsmadi, Fahad Mira
{"title":"IoT security threats analysis based on components, layers and devices","authors":"I. Alsmadi, Fahad Mira","doi":"10.15864/ajse.1101","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security\n threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT\n vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain,\n category or threats.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"65 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American journal of engineering, science and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15864/ajse.1101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain, category or threats.
基于组件、层和设备的物联网安全威胁分析
物联网(iot)继续发展,覆盖不同类型的应用,将我们、我们的电器、我们的小工具等与互联网连接起来。从这些设备上传或与它们交换的信息是非常重要的,可以对我们产生重大影响。因此,来自这些设备的安全威胁和攻击会严重影响我们。在这篇系统的文献综述中,我们根据不同的类别评估了物联网的安全威胁和攻击,例如:基于物联网架构层的物联网漏洞、威胁和攻击,以及基于物联网组件的物联网漏洞、威胁和攻击。我们展示了基于这些类别的开放研究领域。由于物联网的应用范围很广,我们希望这种分类可以帮助该领域的研究人员将研究重点放在一个特定的领域、类别或威胁上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信