Reference Hub1
A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)

A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)

Anish Khan, Dragan Peraković
Copyright: © 2022 |Pages: 28
ISBN13: 9781799877899|ISBN10: 1799877892|EISBN13: 9781799877912
DOI: 10.4018/978-1-7998-7789-9.ch009
Cite Chapter Cite Chapter

MLA

Khan, Anish, and Dragan Peraković. "A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)." Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, IGI Global, 2022, pp. 148-175. https://doi.org/10.4018/978-1-7998-7789-9.ch009

APA

Khan, A. & Peraković, D. (2022). A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs). In B. Gupta (Ed.), Advances in Malware and Data-Driven Network Security (pp. 148-175). IGI Global. https://doi.org/10.4018/978-1-7998-7789-9.ch009

Chicago

Khan, Anish, and Dragan Peraković. "A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)." In Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, 148-175. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-7789-9.ch009

Export Reference

Mendeley
Favorite

Abstract

The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious solutions. As a new phase of computing emerges in the digital world, it intends to produce a huge number of smart gadgets that can host a wide range of applications and operations. IoT gadgets are a perfect target for cyber assaults because of their wide dispersion, availability/accessibility, and top-notch computing power. Furthermore, as numerous IoT devices gather and investigate private data, they become a gold mine for hostile actors. Hence, the matter of fact is that security, particularly the potential to diagnose compromised nodes, as well as the collection and preservation of testimony of an attack or illegal activity, have become top priorities. This chapter delves into the timeline and the most challenging security and privacy issues that exist in the present scenario. In addition to this, some open issues and future research directions are also discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.