Reference Hub1
Internet of Things in Cyber Security Scope

Internet of Things in Cyber Security Scope

Mazoon Hashil Alrubaiei, Maiya Hamood Al-Saadi, Hothefa Shaker, Bara Sharef, Shahnawaz Khan
ISBN13: 9781799883821|ISBN10: 1799883825|ISBN13 Softcover: 9781799883838|EISBN13: 9781799883845
DOI: 10.4018/978-1-7998-8382-1.ch008
Cite Chapter Cite Chapter

MLA

Alrubaiei, Mazoon Hashil, et al. "Internet of Things in Cyber Security Scope." Blockchain Technology and Computational Excellence for Society 5.0, edited by Shahnawaz Khan, et al., IGI Global, 2022, pp. 146-187. https://doi.org/10.4018/978-1-7998-8382-1.ch008

APA

Alrubaiei, M. H., Al-Saadi, M. H., Shaker, H., Sharef, B., & Khan, S. (2022). Internet of Things in Cyber Security Scope. In S. Khan, M. Syed, R. Hammad, & A. Bushager (Eds.), Blockchain Technology and Computational Excellence for Society 5.0 (pp. 146-187). IGI Global. https://doi.org/10.4018/978-1-7998-8382-1.ch008

Chicago

Alrubaiei, Mazoon Hashil, et al. "Internet of Things in Cyber Security Scope." In Blockchain Technology and Computational Excellence for Society 5.0, edited by Shahnawaz Khan, et al., 146-187. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-8382-1.ch008

Export Reference

Mendeley
Favorite

Abstract

IoT represents a technologically bright future where heterogeneously connected devices will be connected to the internet and make intelligent collaborations with other objects to extend the borders of the world with physical entities and virtual components. Despite rapid evolution, this environment is still facing new challenges and security issues that need to be addressed. This chapter will give a comprehensive view of IoT technologies. It will discuss the IoT security scope in detail. Furthermore, a deep analysis of the most recent proposed mechanisms is classified. This study will be a guide for future studies, which direct to three primary leading technologies—machine learning (ML), blockchain, and artificial intelligence (AI)—as intelligent solutions and future directions for IoT security issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.