Abstract
This analysis reviews the management of vulnerabilities and security risks of Internet of Things (IoT). This paper provides an overview, which it reveals the recent Internet's growth and how it has transformed our lives in various, unforeseen dimensions and how it has given rise to IoT. The introduction part focuses on providing an analysis on literature by presenting a short IoT history, some technical information on security protocols, and IoT hardware problems. The section on survey is where similar literatures on specific concepts are reviewed by describing the vulnerabilities and threats of IoT systems, and then reviewed risk management mechanisms for both information technologies and information protection. After the review, the analysis and discussion segment addressed and evaluated the details contained in the literature review. In this paper, a new risk management strategy uniquely designed for each IoT system is proposed. Then proposed work is evaluated by discussing the advantages and concluded the analysis and the future work.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Methods for Verifying the Security of Available IoT Devices;2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY);2023-09-21
2. Computer Vision-Based Intrusion Detection System for Internet of Things;Wireless Communications and Mobile Computing;2023-06-12
3. Internet of Things (IoT): survey of most important security risks;2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA);2023-05-21
4. Routing with Cooperative Nodes Using Improved Learning Approaches;Intelligent Automation & Soft Computing;2023
5. Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things;Wireless Communications and Mobile Computing;2022-04-05