当前位置: X-MOL 学术Journal of Applied Security Research › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Internet-of-Things Security and Vulnerabilities: Case Study
Journal of Applied Security Research Pub Date : 2022-02-03 , DOI: 10.1080/19361610.2022.2031841
Ghaida Alqarawi 1 , Bashayer Alkhalifah 1 , Najla Alharbi 1 , Salim El Khediri 1
Affiliation  

Abstract

The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.



中文翻译:

物联网安全和漏洞:案例研究

摘要

物联网在世界范围内的应用在技术领域受到了极大的欢迎。这一伟大的创新,实现了业务和运营转型的无缝转型。然而,这种创新的大量使用也带来了安全威胁,这已成为全球许多企业更关注的关键点。许多依赖物联网的公司都面临着安全漏洞和威胁。物联网对策尚未得到充分考虑,这对许多严重依赖该技术的组织构成了更重大的挑战。在本次调查中,我们提出了一项安全调查,该调查将有助于解决与物联网相关的问题,并在所有物联网层提供安全解决方案。结果表明,身份验证是物联网中实施的最关键的安全措施。

更新日期:2022-02-03
down
wechat
bug