Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review

IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Security and Privacy Pub Date : 2024-07-12 DOI:10.1002/spy2.448
Md. Ataullah, Naveen Chauhan
{"title":"Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review","authors":"Md. Ataullah, Naveen Chauhan","doi":"10.1002/spy2.448","DOIUrl":null,"url":null,"abstract":"In the era heavily influenced by Internet of Things (IoT), prioritizing strong security and the protection of user privacy is of utmost importance. This comprehensive review paper embarks on a meticulous examination of the multifaceted challenges and risks facing IoT security and privacy. It encompasses the hardware, software, and data‐in‐transit domains, shedding light on potential vulnerabilities and associated threats. In response to these concerns, this paper puts forth recommendations for effective strategies to mitigate these risks. Providing a road‐map for enhancing security and privacy in IoT environments. Furthermore, this review thoroughly assesses a multitude of solutions proposed by various authors, with the primary aim of enhancing security and privacy within the IoT landscape. The analysis provides insights into the strengths and limitations of these solutions. This is aiding in the development of a holistic comprehension of the existing status of IoT security and privacy. Moreover, the paper delves into the complexities surrounding integrating emerging technologies into the IoT framework. It explores the obstacles and challenges inherent in this process and proposes potential strategies to address these hurdles. By doing so, the review provides a holistic perspective on existing security and privacy enhancement technologies and offers guidance on navigating the dynamic landscape of emerging technologies within the IoT domain. Publications included in the review consist of journal articles, conference papers, and book chapters from reputable sources indexed in SCI (Science Citation Index), Scopus, and Web of Science.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.448","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In the era heavily influenced by Internet of Things (IoT), prioritizing strong security and the protection of user privacy is of utmost importance. This comprehensive review paper embarks on a meticulous examination of the multifaceted challenges and risks facing IoT security and privacy. It encompasses the hardware, software, and data‐in‐transit domains, shedding light on potential vulnerabilities and associated threats. In response to these concerns, this paper puts forth recommendations for effective strategies to mitigate these risks. Providing a road‐map for enhancing security and privacy in IoT environments. Furthermore, this review thoroughly assesses a multitude of solutions proposed by various authors, with the primary aim of enhancing security and privacy within the IoT landscape. The analysis provides insights into the strengths and limitations of these solutions. This is aiding in the development of a holistic comprehension of the existing status of IoT security and privacy. Moreover, the paper delves into the complexities surrounding integrating emerging technologies into the IoT framework. It explores the obstacles and challenges inherent in this process and proposes potential strategies to address these hurdles. By doing so, the review provides a holistic perspective on existing security and privacy enhancement technologies and offers guidance on navigating the dynamic landscape of emerging technologies within the IoT domain. Publications included in the review consist of journal articles, conference papers, and book chapters from reputable sources indexed in SCI (Science Citation Index), Scopus, and Web of Science.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
探索物联网中的安全和隐私增强技术:全面回顾
在深受物联网(IoT)影响的时代,优先考虑强大的安全性和保护用户隐私至关重要。这篇综合评论文章对物联网安全和隐私面临的多方面挑战和风险进行了细致的研究。它涵盖了硬件、软件和传输中的数据领域,揭示了潜在的漏洞和相关威胁。针对这些问题,本文提出了降低这些风险的有效策略建议。为加强物联网环境中的安全和隐私提供了路线图。此外,本综述还全面评估了不同作者提出的多种解决方案,其主要目的是增强物联网环境中的安全性和隐私性。分析深入揭示了这些解决方案的优势和局限性。这有助于全面了解物联网安全和隐私的现状。此外,本文还深入探讨了将新兴技术融入物联网框架的复杂性。它探讨了这一过程中固有的障碍和挑战,并提出了解决这些障碍的潜在策略。通过这样做,该综述提供了一个关于现有安全和隐私增强技术的整体视角,并为在物联网领域内驾驭新兴技术的动态景观提供了指导。本综述收录的出版物包括期刊论文、会议论文和书籍章节,均来自 SCI(科学引文索引)、Scopus 和 Web of Science 索引的知名来源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
5.30%
发文量
80
期刊最新文献
IoT malware detection using static and dynamic analysis techniques: A systematic literature review An approach for mitigating cognitive load in password management by integrating QR codes and steganography Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review Research on privacy leakage of celebrity's ID card number based on real‐name authentication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1