Author
Abstract
In light of the widespread integration of the Internet of Things (IoT), it is crucial for organizations to prioritize their attention towards establishing resilient system security. The presence of any vulnerability within a system has the potential to result in system failure or a cyberattack, hence causing significantrepercussions on a wide scale. This encompasses a set of measures and protocols designed to safeguard against cyber threats that especially exploit vulnerabilities in physically interconnected IoT devices. The security teams responsible for managing IoT security are currently facing a range of challenges, including but not limited to inventory management, operational complexities, variety in IoT devices, ownership concerns, increasing data volumes, and emerging threats. This review provides a critical analysis of the existing body of research pertaining to the subject of security in the context of the IoT. The focus is mostly on the present state of affairs, practical implementations, and the issues that are associated with this domain. Moreover, it delves into the prospective prospects and opportunities that are anticipated in this particular domain. Lately, there has been a noticeable surge in interest among scholars hailing from diverse academic disciplines and geographical locations, all focusing on theimprovement of internet network security. The assurance of data integrity, confidentiality, authentication, and authorization is imperative in light of the substantial volume of data that traverses network devices. Nevertheless, the field of IoT security exhibits significant potential for further development. The IoT has become a popular technology paradigm that facilitates the integration of diverse objects and systems. Yet, the extensive use of the IoT has generated apprehensions regarding security, specifically pertaining to the safeguarding of data and the integrity of networks.
Suggested Citation
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:abq:ijist1:v:5:y:2023:i:4:p:503-522. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iqra Nazeer (email available below). General contact details of provider: .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.