Abstract
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
Highlights
The perceived reality of every person consists of physical dimensions but includes a significant virtual presence in cyberspace
We focus on security issues related to blockchains, which apply to Internet of Things (IoT) applications
IoT devices, especially those connected to the cloud providers can represent problems with privacy, leaking unintended real-world private data
Summary
The perceived reality of every person consists of physical dimensions but includes a significant virtual presence in cyberspace. The cyberspace dimension, is not separate: a huge array of connected sensors brings data from the physical world to cyberspace. These data influence the behavior of people connected to cyberspace, as well as feed back to processes in the physical world, especially in control systems. It is critically important to focus on security aspects of cybernetic reality, especially in domains, where it has a strong interaction with the physical world. The core of the interactions between physical and virtual worlds is due to the emergence and spread of the Internet of Things. The security of complex systems, such as the Internet of Things, requires a combination of partial security solutions, which create a further potential for attacks. Evolutionary techniques are connected to the development of artificial intelligence that oversees the security of our IoT devices and report and prevents possible security incidents
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have