Smart City Gnosys

Smart city article details

Title A Review On Iots Applications And Security Threats Via Data Transfer Over Networks
ID_Doc 4269
Authors Radhi B.M.; Hussain M.A.; Abduljabbar Z.A.; Nyangaresi V.O.; Aldarwish A.J.Y.
Year 2024
Published Lecture Notes in Networks and Systems, 1119 LNNS
DOI http://dx.doi.org/10.1007/978-3-031-70300-3_42
Abstract The concept of the “Internet of Things,” which states that everything is connected to everything else and that everything interacts with everything else, is a fascinating information technology concept. The integration of these devices will add to the remarkable change and prosperity in the world. This interconnectedness occurs through the exchange of data and information and enables us to communicate with objects in our environment. The Internet of Things is being integrated into the daily operations of many industries. Smart cities, smart grids, smart homes, logistics, e-health, and physical security are some examples. IoTs applications that deliver quality and affordability can be supported by an IoTs-enabled smart building. It is essential for smart buildings to handle and regulate a variety of operating variables, including temperature, humidity, lighting, ventilation, safety, and more. Creating living areas with higher levels of luxury and a higher standard of living is also essential. However, there are still concerns about privacy and security. Attackers and hackers will find this large volume of transferred data to be a very interesting setup. In order to address security and privacy concerns, we will explain the issues in this article, along with their basic requirements, potential risks, countermeasures and comprehensive analysis of Cyber-attacks in smart environment. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
Author Keywords Internet of Things; IoTs Protocols; Malicious-Attacks; Smart Building


Similar Articles


Id Similarity Authors Title Published
47885 View0.902Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)
47991 View0.892Bilal A.; Shah S.J.; Khan M.A.; Khan M.; Bharmal A.H.; Mumtaz T.Security Threats And Research Challenges Of Iot-A ReviewICETECC 2022 - International Conference on Emerging Technologies in Electronics, Computing and Communication (2022)
53430 View0.889Yengayenga F.; Emanuel A.W.R.Study On Iot: Applications And Security Risks2023 6th International Conference on Information and Communications Technology, ICOIACT 2023 (2023)
47849 View0.889Agarwal A.K.; Jindal R.K.; Chaudhary D.; Tiwari R.G.; Sharma M.Security And Privacy Concerns In The Internet Of Things: A Comprehensive ReviewProceedings of the 2022 11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022 (2022)
47990 View0.888Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
57296 View0.887Seeam A.; Ogbeh O.S.; Guness S.; Bellekens X.Threat Modeling And Security Issues For The Internet Of Things2nd International Conference on Next Generation Computing Applications 2019, NextComp 2019 - Proceedings (2019)
18302 View0.886Choudhary V.; Tanwar S.; Rana A.Demystifying Security And Applications Of Internet Of Things2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021 (2021)
47945 View0.884Tabassum K.; Ibrahim A.; El Rahman S.A.Security Issues And Challenges In Iot2019 International Conference on Computer and Information Sciences, ICCIS 2019 (2019)
47858 View0.883Chanal P.M.; Kakkasageri M.S.Security And Privacy In Iot: A SurveyWireless Personal Communications, 115, 2 (2020)
47880 View0.882Lu Y.Security And Privacy Of Internet Of Things: A Review Of Challenges And SolutionsJournal of Cyber Security and Mobility, 12, 6 (2023)