Smart City Gnosys

Smart city article details

Title A Systematic Literature Review: Challenges Of Security Optimization While Maintaining A Good Accessibility In Internet Of Things
ID_Doc 5446
Authors Tampubolon D.G.; Widodo G.N.; Margaretha J.S.; Gunawan A.A.S.; Edbert I.S.
Year 2023
Published Proceedings - 2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System: Responsible Technology for Sustainable Humanity, ICE3IS 2023
DOI http://dx.doi.org/10.1109/ICE3IS59323.2023.10335260
Abstract The Internet of Things (IoT), which has had a tremendous development in recent years, has altered many aspects of daily life by giving rise to commercial tools, home automation, wearable technology, and the framework for smart cities. The modern fantasy of having remote control over several parts of life has been realized because to this continuous connectivity and the ability of devices to acquire and interpret information. However, the various features and functionalities of IoT devices are a double-edged sword because they introduce a number of security flaws and dangers. Through a Systematic Literature Review (SLR), we explore vulnerabilities and their mitigation strategies based on prior research in the field. Notably, while the importance of security in IoT is paramount, especially considering the sensitivity of data involved, there exists a challenge in striking a balance between robust security and user convenience. It's imperative that while bolstering security, we do not compromise on user accessibility. This paper presents a comprehensive discourse addressing the dual challenges of security and accessibility in the IoT landscape. Our findings underscore the urgent need for layered security protocols, encryption, and user authentication to counteract the escalating cyber threats. We conclude by proposing a balanced solution that ensures both security and accessibility in the IoT ecosystem. © 2023 IEEE.
Author Keywords accessibility; IoT; security; technology


Similar Articles


Id Similarity Authors Title Published
47934 View0.923Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
4300 View0.899Abiodun O.I.; Abiodun E.O.; Alawida M.; Alkhawaldeh R.S.; Arshad H.A Review On The Security Of The Internet Of Things: Challenges And SolutionsWireless Personal Communications, 119, 3 (2021)
47865 View0.892Awad A.I.; Abawajy J.Security And Privacy In The Internet Of Things: Architectures, Techniques, And ApplicationsSecurity and Privacy in the Internet of Things: Architectures, Techniques, and Applications (2021)
47991 View0.89Bilal A.; Shah S.J.; Khan M.A.; Khan M.; Bharmal A.H.; Mumtaz T.Security Threats And Research Challenges Of Iot-A ReviewICETECC 2022 - International Conference on Emerging Technologies in Electronics, Computing and Communication (2022)
47885 View0.888Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)
33617 View0.884Butt H.A.; Imran I.; Ahad A.; Ahad A.; Ahad A.; Farid J.; Madeira F.Iot And Wearable Devices: Security Challenges And SolutionsAI and Blockchain Applications for Privacy and Security in Smart Medical Systems (2025)
5963 View0.884Trabelsi R.; Fersi G.; Jmaiel M.Access Control In Internet Of Things: A SurveyComputers and Security, 135 (2023)
54316 View0.881Kadel A.; Gangakhedkar T.; Patidar Y.; Ghosh A.; Panchal A.; Albalawi N.S.Systematic Literature Review On Security And Privacy Issues On Wsn And IotSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
33253 View0.879Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
5283 View0.878Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)