The emergence of the Internet of Things (IoT) technology has brought about tremendous possibilities, but at the same time, it has opened up new vulnerabilities and attack vectors that could compromise the confidentiality, integrity, and availability of connected systems. Developing a secure IoT ecosystem is a daunting challenge that requires a systematic and holistic approach to identify and mitigate potential security threats. Cybersecurity research considerations play a critical role in this regard, as they provide the foundation for designing and implementing security measures that can address emerging risks. To achieve a secure IoT ecosystem, scientists and engineers must first define rigorous security specifications that serve as the foundation for developing secure devices, chipsets, and networks. Developing such specifications requires an interdisciplinary approach that involves multiple stakeholders, including cybersecurity experts, network architects, system designers, and domain experts. The primary challenge in IoT security is ensuring the system can defend against both known and unknown attacks. To date, the IoT research community has identified several key security concerns related to the architecture of IoT systems. These concerns include issues related to connectivity, communication, and management protocols. This research paper provides an all-inclusive and lucid review of the current state of anomalies and security concepts related to the IoT. We classify and analyze prevalent security distresses regarding IoT's layered architecture, including connectivity, communication, and management protocols. We establish the foundation of IoT security by examining the current attacks, threats, and cutting-edge solutions. Furthermore, we set security goals that will serve as the benchmark for assessing whether a solution satisfies the specific IoT use cases.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10142206 | PMC |
http://dx.doi.org/10.3390/s23084117 | DOI Listing |
Front Artif Intell
December 2024
Hospital and Rehabilitation Centre for the Disabled Children (HRDC), Banepa, Nepal.
Introduction: The convergence of healthcare with the Internet of Things (IoT) and Artificial Intelligence (AI) is reshaping medical practice with promising enhanced data-driven insights, automated decision-making, and remote patient monitoring. It has the transformative potential of these technologies to revolutionize diagnosis, treatment, and patient care.
Purpose: This study aims to explore the integration of IoT and AI in healthcare, outlining their applications, benefits, challenges, and potential risks.
Sci Rep
December 2024
Department of Information Security, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, 632014, Tamil Nadu, India.
In Internet of Things (IoT) networks, identifying the primary Medium Access Control (MAC) layer protocol which is suited for a service characteristic is necessary based on the requirements of the application. In this paper, we propose Energy Efficient and Group Priority MAC (EEGP-MAC) protocol using Hybrid Q-Learning Honey Badger Algorithm (QL-HBA) for IoT Networks. This algorithm employs reinforcement agents to select an environment based on predefined actions and tasks.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Information Technology, College of Computer, Qassim University, Buraydah, 51452, Saudi Arabia.
The emergence of 6G cognitive radio IoT networks introduces both opportunities and complexities in spectrum access and security. Blockchain technology has emerged as a viable solution to address these challenges, offering enhanced security, transparency, and efficiency in spectrum management. This survey paper offers a thorough analysis of recent advancements in blockchain-enabled security mechanisms specifically for spectrum access within 6G cognitive radio IoT networks.
View Article and Find Full Text PDFSci Rep
December 2024
School of Electronic and Nanoscale Engineering, University of Glasgow, Glasgow, G12 8QQ, UK.
In the era of the Internet of Things (IoT), the transmission of medical reports in the form of scan images for collaborative diagnosis is vital for any telemedicine network. In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods.
View Article and Find Full Text PDFSci Rep
December 2024
Computer Engineering Department, Umm Al-Qura University, Mecca, 24381, Saudi Arabia.
Efficient traffic management solutions in 6G communication systems face challenges as the scale of the Internet of Things (IoT) grows. This paper aims to yield an all-inclusive framework ensuring reliable air pollution monitoring throughout smart cities, capitalizing on leading-edge techniques to encourage large coverage, high-accuracy data, and scalability. Dynamic sensors deployed to mobile ad-hoc pieces of fire networking sensors adapt to ambient changes.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!