Abstract

AbstractNowadays, communication systems and networks, become an integral part of not only our everyday life but also even in industry, critical infrastructure, business, etc. Current trends and paradigms, such as Internet of Things (IoT), promise improved quality of life, better business opportunities, cost-effective production, and careful operation management via ubiquitous connectivity and effective deployment of smart physical objects. IoT networks capture, gather, process, and transmit a huge amount of security- and privacy-critical data, then becomes them an available option for intruders. Given the fact that IoT networks deal with the fundamental aspects of human lives and critical infrastructures, cybersecurity in such networks is crucially important. The unique characteristics, large scale, and complexity of these networks bring about further vulnerabilities. The goal of this paper is to shed light on the security requirements of the IoT application layer, its threats, and potential countermeasures.KeywordsInternet of ThingsSecurityPrivacySecurity requirementsTaxonomy

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call