IDEAS home Printed from https://ideas.repec.org/h/spr/isochp/978-3-030-74644-5_3.html
   My bibliography  Save this book chapter

IoT Security and New Trends of Solutions

In: Introduction to Internet of Things in Management Science and Operations Research

Author

Listed:
  • Xiaoyu Gu

    (Nanjing University of Science and Technology)

  • Zhe Zhang

    (Nanjing University of Science and Technology)

Abstract

This chapter focuses on the security issues of the Internet of Things (IoT). We hope to explore the development direction of IoT security through discussion of technology. The IoT can make individuals more closely connected, but it may spread individual or local insecurity factors to a wider range. Specifically, we will discuss IoT security in detail with six sections. The first section will discuss the foundation of IoT security. Then, we will discuss the security issues in perception layer. This layer is the core of IoT and its security is a prerequisite for information security and privacy protection of IoT. The third section is IoT security in the network layer and then we will discuss the security in IoT applications. In terms of security in application layer, we will discuss security technologies and security strategies for IoT applications. In particular, as more and more applications are running with cloud service, we will focus on the security issues of cloud computing applications. Section 5 discusses some case studies of IoT security, and Sect. 6 discusses possible future research directions for IoT security. We hope that this whole chapter could give readers a preliminary understanding of the security of the IoT and try to think about the relationship between technology and the human society in the IoT.

Suggested Citation

  • Xiaoyu Gu & Zhe Zhang, 2021. "IoT Security and New Trends of Solutions," International Series in Operations Research & Management Science, in: Fausto Pedro García Márquez & Benjamin Lev (ed.), Introduction to Internet of Things in Management Science and Operations Research, pages 55-76, Springer.
  • Handle: RePEc:spr:isochp:978-3-030-74644-5_3
    DOI: 10.1007/978-3-030-74644-5_3
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:isochp:978-3-030-74644-5_3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.