Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani
{"title":"基于5G无线通信的物联网网络安全攻击","authors":"Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani","doi":"10.32604/jiot.2021.015900","DOIUrl":null,"url":null,"abstract":"The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by the five G technology, it is subject to many security challenges. In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Attacks on the IoT Network with 5G Wireless Communication\",\"authors\":\"Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani\",\"doi\":\"10.32604/jiot.2021.015900\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by the five G technology, it is subject to many security challenges. In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.\",\"PeriodicalId\":345256,\"journal\":{\"name\":\"Journal on Internet of Things\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal on Internet of Things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32604/jiot.2021.015900\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal on Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32604/jiot.2021.015900","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Attacks on the IoT Network with 5G Wireless Communication
The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by the five G technology, it is subject to many security challenges. In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.