DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16278
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGupta, Shashank-
dc.date.accessioned2024-10-29T09:42:59Z-
dc.date.available2024-10-29T09:42:59Z-
dc.date.issued2020-05-
dc.identifier.urihttps://onlinelibrary.wiley.com/doi/full/10.1002/dac.4443-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16278-
dc.description.abstractIn the recent era, the security issues affecting the future Internet-of-Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT-centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT-related vulnerabilities. This article is a multi-fold survey that emphasizes on understanding the crucial causes of novel vulnerabilities in IoT paradigms and issues in existing research. Initially, we have emphasized on different layers of IoT architecture and highlight various emerging security challenges associated with each layer along with the key issues of different IoT systems. Secondly, we discuss the exploitation, detection, and defense methodologies of IoT malware-enabled distributed denial of service (DDoS), Sybil, and collusion attack capabilities. We have also discussed numerous state-of-the-art strategies for intrusion detection and methods for IDS setup in future IoT systems. Third, we have presented a brief classification of existing IoT authentication protocols and a comparative analysis of such protocols based on different IoT-enabled cyber attacks. For conducting a real-time future IoT research, we have presented some emerging blockchain solutions. We have also discussed a comparative examination of some of the recently developed simulation tools and IoT test beds that are characterized based on different layers of IoT infrastructure. We have also outlined some of the open issues and future research directions and also facilitate the readers with broad classification of existing surveys in this domain that addresses several scopes related to the IoT paradigm. This survey article focuses in enabling IoT-related research activities by comparing and merging scattered surveys in this domain.en_US
dc.language.isoenen_US
dc.publisherWileyen_US
dc.subjectComputer Scienceen_US
dc.subjectIoT devicesen_US
dc.subjectIntrusion detection systems (IDS)en_US
dc.subjectDistributed denial of service (DDoS)en_US
dc.titleFuture IoT-enabled threats and vulnerabilities: State of the art, challenges, and future prospectsen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.