{"title":"现代物联网技术的安全与隐私问题","authors":"Samiya Majid Baba, I. Bala","doi":"10.51983/ajeat-2022.11.1.3304","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is present in every aspect of our lives. They are used in our households, in hospitals, and outside to monitor and report environmental improvements, deter fires, and perform a variety of other useful functions. However, both of these advantages can come at the expense of significant security and risks privacy. Several academic research have been conducted to counteract these issues and figure out a better way to remove or minimise the threats to the user’s privacy and protection specifications in IoT devices. The survey is divided into four parts. The first section would look at the most important shortcomings of IoT devices and how to overcome them. The description of IoT attacks will be presented in the second section. The final section would look at security problems at various layers.","PeriodicalId":8524,"journal":{"name":"Asian Journal of Engineering and Applied Technology","volume":"32 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Privacy Concerns for the Modern Technology of Internet of Things\",\"authors\":\"Samiya Majid Baba, I. Bala\",\"doi\":\"10.51983/ajeat-2022.11.1.3304\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) is present in every aspect of our lives. They are used in our households, in hospitals, and outside to monitor and report environmental improvements, deter fires, and perform a variety of other useful functions. However, both of these advantages can come at the expense of significant security and risks privacy. Several academic research have been conducted to counteract these issues and figure out a better way to remove or minimise the threats to the user’s privacy and protection specifications in IoT devices. The survey is divided into four parts. The first section would look at the most important shortcomings of IoT devices and how to overcome them. The description of IoT attacks will be presented in the second section. The final section would look at security problems at various layers.\",\"PeriodicalId\":8524,\"journal\":{\"name\":\"Asian Journal of Engineering and Applied Technology\",\"volume\":\"32 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asian Journal of Engineering and Applied Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51983/ajeat-2022.11.1.3304\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Engineering and Applied Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51983/ajeat-2022.11.1.3304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Privacy Concerns for the Modern Technology of Internet of Things
The Internet of Things (IoT) is present in every aspect of our lives. They are used in our households, in hospitals, and outside to monitor and report environmental improvements, deter fires, and perform a variety of other useful functions. However, both of these advantages can come at the expense of significant security and risks privacy. Several academic research have been conducted to counteract these issues and figure out a better way to remove or minimise the threats to the user’s privacy and protection specifications in IoT devices. The survey is divided into four parts. The first section would look at the most important shortcomings of IoT devices and how to overcome them. The description of IoT attacks will be presented in the second section. The final section would look at security problems at various layers.