{"title":"物联网:通信协议和安全威胁","authors":"Apostolos Gerodimos , Leandros Maglaras , Mohamed Amine Ferrag , Nick Ayres , Ioanna Kantzavelou","doi":"10.1016/j.iotcps.2022.12.003","DOIUrl":null,"url":null,"abstract":"<div><p>In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 1-13"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoT: Communication protocols and security threats\",\"authors\":\"Apostolos Gerodimos , Leandros Maglaras , Mohamed Amine Ferrag , Nick Ayres , Ioanna Kantzavelou\",\"doi\":\"10.1016/j.iotcps.2022.12.003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.</p></div>\",\"PeriodicalId\":100724,\"journal\":{\"name\":\"Internet of Things and Cyber-Physical Systems\",\"volume\":\"3 \",\"pages\":\"Pages 1-13\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things and Cyber-Physical Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667345222000293\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things and Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667345222000293","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, presenting several sectors that can benefit the most from IoT development. Discussion over the findings of this review reveals open issues and challenges and specifies the next steps required to expand and support IoT systems in a secure framework.