Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ACCESS.2019.2924045
DC Field | Value | |
---|---|---|
dc.title | A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures | |
dc.contributor.author | Hassija, V. | |
dc.contributor.author | Chamola, V. | |
dc.contributor.author | Saxena, V. | |
dc.contributor.author | Jain, D. | |
dc.contributor.author | Goyal, P. | |
dc.contributor.author | Sikdar, B. | |
dc.date.accessioned | 2021-12-09T04:57:18Z | |
dc.date.available | 2021-12-09T04:57:18Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7 : 82721-82743. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2924045 | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/210052 | |
dc.description.abstract | The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed. © 2013 IEEE. | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.source | Scopus OA2019 | |
dc.subject | Blockchain | |
dc.subject | Distributed systems | |
dc.subject | Edge computing | |
dc.subject | Fog computing | |
dc.subject | Internet of Things (IoT) | |
dc.subject | IoT applications | |
dc.subject | IoT security | |
dc.subject | Machine learning | |
dc.type | Review | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/ACCESS.2019.2924045 | |
dc.description.sourcetitle | IEEE Access | |
dc.description.volume | 7 | |
dc.description.page | 82721-82743 | |
Appears in Collections: | Staff Publications Elements |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1109_ACCESS_2019_2924045.pdf | 3.95 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License