Investigating the IoT Security and Privacy Challenges: Summary and Recommendations

  • Chauhan P
  • Ahmad S
  • Khan P
  • et al.
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

With the development of innovative technology transformation like cloud and Internet of Things (IoT), more technology companies are pursuing research in employing such innovations. Smart homes and cities are just two examples of the many systems and technologies that the IoT can endorse. IoT - based smart objects communicate with other parts, such as proxies, portable devices, as well as data collectors. Although these components help to tackle a number of societal issues and offer users new, cutting-edge services, their confined processing power makes them susceptible to well-known privacy and security attacks. This in turn highlights the demand for a strong technical as well as legislative foundation and asserts the significance of validity and reliability in IoT. This paper provides an insight of the IoT, security, as well as privacy challenges, and also discusses the recommendations for IoT solutions. Further we also highlighting some unresolved problems that require further study.

Cite

CITATION STYLE

APA

Chauhan, P., Ahmad, S., Khan, P. R., & Khan, N. A. (2022). Investigating the IoT Security and Privacy Challenges: Summary and Recommendations. EAI Endorsed Transactions on Cloud Systems, 7(22), e5. https://doi.org/10.4108/eetcs.v7i22.2652

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free