Internet of Things in Cyber Security Scope

Internet of Things in Cyber Security Scope

Mazoon Hashil Alrubaiei, Maiya Hamood Al-Saadi, Hothefa Shaker, Bara Sharef, Shahnawaz Khan
Copyright: © 2022 |Pages: 42
DOI: 10.4018/978-1-7998-8382-1.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

IoT represents a technologically bright future where heterogeneously connected devices will be connected to the internet and make intelligent collaborations with other objects to extend the borders of the world with physical entities and virtual components. Despite rapid evolution, this environment is still facing new challenges and security issues that need to be addressed. This chapter will give a comprehensive view of IoT technologies. It will discuss the IoT security scope in detail. Furthermore, a deep analysis of the most recent proposed mechanisms is classified. This study will be a guide for future studies, which direct to three primary leading technologies—machine learning (ML), blockchain, and artificial intelligence (AI)—as intelligent solutions and future directions for IoT security issues.
Chapter Preview
Top

Overview Of Iot Technologies

The concept of the internet of things started in 1998 and was introduced by Kevin Ashton in 1999 as it endeavors to take advantage of the smart technology by connecting anything anytime and anywhere and reduces the physical work by automation (Patra & Rao, 2016). As per The International Telecommunication Union definition, the Internet of Things is an international infrastructure for an information society that enables improved services to connect things physically or virtually based on communication technologies and interoperable data. PDA’s, smartphones, tablets, laptops, and many other handheld devices(Viel, Silva, Valderi Leithardt, & Zeferino, 2019)(Chopra, Gupta, & Lambora, 2019). Like any technology, IoT has specific characteristics. In this section, IoT elements, architecture, applications, communications technologies, major constrains, security requirements and attacks, analysis of IoT security solutions and future direction and suggestion of security responses in IoT will be discussed.

Complete Chapter List

Search this Book:
Reset