Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies

Küçük Resim Yok

Tarih

2024

Dergi Başlığı

Dergi ISSN

Cilt Başlığı

Yayıncı

Engineering and Technology Publishing

Erişim Hakkı

info:eu-repo/semantics/openAccess

Özet

As a network of objects, data, and the Internet, the Internet of Things can be characterized as a collection of interconnected devices. In the context of the Internet of Things, a thing refers to any object, such as a sensor, that forms a network and can transfer data with other devices. This interconnection of devices leads to the convergence of physical and digital domains, thereby enabling time optimization, cost reduction, and enhanced efficiency in human labor. The Internet of Things enables data exchange to monitor and control interconnected devices, manufacturers and operators. A discernible transition from non-IoT to IoT devices has been evident over the past decade. Projections indicate that by 2030, approximately 75% of all devices will be integrated into the IoT. Consequently, these devices generate a substantial influx of data, commonly called Big Data. Unlike traditional computing systems, IoT devices operate in diverse, often resource-constrained environments, making them susceptible to weak authentication, insecure communication, physical vulnerabilities, data privacy risks, DoS attacks, malware propagation, and interoperability issues. These concerns can lead to data breaches, unauthorized access, and system disruptions. Cryptography offers an efficacious means of bidirectional data transmission that can enhance the security of IoT devices and the data they transmit and store, employing authentication and key management, encryption, message integrity and authentication, and Post-Quantum cryptography. This manuscript comprehensively examines the security predicaments of the Internet of Things and illustrates the effectiveness of cryptographic methodologies in ameliorating these concerns. This research not only contributes to a comprehensive understanding of existing cryptographic techniques in IoT security but also offers a forward-looking perspective that can guide future research efforts and inform practical implementations. © 2024 by the authors.

Açıklama

Anahtar Kelimeler

cryptography, IoT security, systematic key algorithms

Kaynak

Journal of Communications

WoS Q Değeri

Scopus Q Değeri

Q3

Cilt

19

Sayı

2

Künye