Abstract
Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world. However, the nature of the internet, communication means, embedded OS, and backend recourses make IoT objects vulnerable to cyber-attacks. For example, the Mirai botnet attack used the IoT to perform the DDoS attack that took down many popular websites. In addition, most standard and conventional security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and there is an urgent need to analyze current IoT-specific cyber-attacks and to design suitable and efficient security mechanisms.
Highlights
Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world
The Mirai botnet attack used the IoT to perform the DDoS attack that took down many popular websites
Most standard and conventional security solutions designed for enterprise systems are not applicable to IoT devices
Summary
Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world. In the article ‘‘Security, privacy and trust for smart mobileInternet of Things (M-IoT): A survey,’’ by Sharma et al, the authors describe the concept and ideology of smart M-IoT networks including their applications, advances, challenges, characteristics, technologies, and standards.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have