期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges 被引量:3
1
作者 Tinshu Sasi Arash Habibi Lashkari +2 位作者 Rongxing Lu Pulei Xiong Shahrear Iqbal 《Journal of Information and Intelligence》 2024年第6期455-513,共59页
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co... The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter. 展开更多
关键词 Internet of Things iotattacks TAXONOMY VULNERABILITIES Detectionmethods CHALLENGES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部