Smart City Gnosys

Smart city article details

Title Review Of Security Threats And Attacks On Iot-Based New Age Ecosystems
ID_Doc 46474
Authors Bhardwaj A.; Rahman S.
Year 2024
Published Proceedings - 2024 7th International Conference on Information and Computer Technologies, ICICT 2024
DOI http://dx.doi.org/10.1109/ICICT62343.2024.00073
Abstract Devices connected to the Internet of Things (IoT) are pervasive in our daily lives, with uses ranging from consumer systems to business and industrial ones. The rapid expansion and widespread use of IoT devices highlight the significance of using solid cybersecurity procedures throughout the device development life cycle. By offering features like controlling and monitoring linked, intelligent items, IoT is revolutionizing everyone's life. Smart cities, homes, autos, manufacturing, e-healthcare, intelligent control systems, transportation, wearables, farming, and more are just a few examples of IoT applications. This study analyses the work done over the previous two years to protect smart IoT-based devices and ecosystems against security risks and attacks. © 2024 IEEE.
Author Keywords Compromise; Internet of Things; IoT; IoT Attacks; IoT Security; IoT Threats


Similar Articles


Id Similarity Authors Title Published
47991 View0.891Bilal A.; Shah S.J.; Khan M.A.; Khan M.; Bharmal A.H.; Mumtaz T.Security Threats And Research Challenges Of Iot-A ReviewICETECC 2022 - International Conference on Emerging Technologies in Electronics, Computing and Communication (2022)
47990 View0.89Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
53430 View0.886Yengayenga F.; Emanuel A.W.R.Study On Iot: Applications And Security Risks2023 6th International Conference on Information and Communications Technology, ICOIACT 2023 (2023)
18302 View0.881Choudhary V.; Tanwar S.; Rana A.Demystifying Security And Applications Of Internet Of Things2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021 (2021)
9270 View0.88Sood R.; Sharma V.Analysis Of Security Breach Using Iot Devices In Smart Cities2024 IEEE 4th International Conference on ICT in Business Industry and Government, ICTBIG 2024 (2024)
47934 View0.879Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47989 View0.879Anwar R.W.; Zainal A.; Abdullah T.; Iqbal S.Security Threats And Challenges To Iot And Its Applications: A Review2020 5th International Conference on Fog and Mobile Edge Computing, FMEC 2020 (2020)
47885 View0.879Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)
10436 View0.875Jun Y.; Craig A.; Shafik W.; Sharif L.Artificial Intelligence Application In Cybersecurity And CyberdefenseWireless Communications and Mobile Computing, 2021 (2021)
4269 View0.874Radhi B.M.; Hussain M.A.; Abduljabbar Z.A.; Nyangaresi V.O.; Aldarwish A.J.Y.A Review On Iots Applications And Security Threats Via Data Transfer Over NetworksLecture Notes in Networks and Systems, 1119 LNNS (2024)