Abstract

Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. The three important components of IoT are sensing, processing, and transmission of data. Nowadays, the new IoT technology is used in many different sectors, including the domestic, healthcare, telecommunications, environment, industry, construction, water management, and energy. IoT technology, involving the usage of embedded devices, differs from computers, laptops, and mobile devices. Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. Furthermore, IoT requires lightweight encryption techniques. Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service.

Highlights

  • IntroductionIt has become an indispensable tool in our everyday life

  • In recent years, technology sector has known a real evolution

  • The study performed in this paper is mainly focused on the security of IoT technology

Read more

Summary

Introduction

It has become an indispensable tool in our everyday life Among these recent technologies, the Internet of ings (IoT) has been improved continuously and has attracted more and more people. The evolution of the Internet began with the creation of a simple computer network linking personal computers and moved on to client-server architecture networks, World Wide Web, e-mail, file sharing, etc. It reaches a wide area network interconnecting billions of intelligent objects, which were embedded in sophisticated systems. It reaches a wide area network interconnecting billions of intelligent objects, which were embedded in sophisticated systems. eir operation is based on sensors and actuators designed for monitoring, controlling, and interacting with the physical environment where they exist

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call