Abstract

With its applicability and scope, IoT technology plays a role in facilitating daily life. Human independent interactions are become obligatory by technological innovations and connectivity. Mobile IoT represents the network structure created by customized smart devices with customized applications and personalized structure. Remote and simple management of industrial control systems and organizations in many different fields are became easier with M-IoT devices and network structure. M-IoT applications have emerged in all areas from smart home systems to health systems and remote access. Since M-IoT applications are characterized as the development and evolution of IoT networks, it inherits on the security issues and challenges of IoT networks. The fact that security and privacy solutions in traditional computer networks cannot be used in M-IoT networks and applications on account of many reasons, highlights the need for security solutions in this field. In this paper, we present an overview of M-IoT networks. M-IoT structure and application layer protocols are analyzed. Security challenges and vulnerabilities in M-IoT application layer and applications are emphasized. In addition, the application layer is examined and the security attacks are summarized. Furthermore, list of open problems in the literature are listed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.