{"title":"物联网中的网络安全威胁:综述","authors":"Pragati Rana, B. Patil","doi":"10.3233/jhs-222042","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"26 1-3","pages":"105-120"},"PeriodicalIF":0.7000,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cyber security threats in IoT: A review\",\"authors\":\"Pragati Rana, B. Patil\",\"doi\":\"10.3233/jhs-222042\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.\",\"PeriodicalId\":54809,\"journal\":{\"name\":\"Journal of High Speed Networks\",\"volume\":\"26 1-3\",\"pages\":\"105-120\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2023-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of High Speed Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/jhs-222042\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of High Speed Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/jhs-222042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.
期刊介绍:
The Journal of High Speed Networks is an international archival journal, active since 1992, providing a publication vehicle for covering a large number of topics of interest in the high performance networking and communication area. Its audience includes researchers, managers as well as network designers and operators. The main goal will be to provide timely dissemination of information and scientific knowledge.
The journal will publish contributed papers on novel research, survey and position papers on topics of current interest, technical notes, and short communications to report progress on long-term projects. Submissions to the Journal will be refereed consistently with the review process of leading technical journals, based on originality, significance, quality, and clarity.
The journal will publish papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.