Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies
Küçük Resim Yok
Tarih
2024
Dergi Başlığı
Dergi ISSN
Cilt Başlığı
Yayıncı
Engineering and Technology Publishing
Erişim Hakkı
info:eu-repo/semantics/openAccess
Özet
As a network of objects, data, and the Internet, the Internet of Things can be characterized as a collection of interconnected devices. In the context of the Internet of Things, a thing refers to any object, such as a sensor, that forms a network and can transfer data with other devices. This interconnection of devices leads to the convergence of physical and digital domains, thereby enabling time optimization, cost reduction, and enhanced efficiency in human labor. The Internet of Things enables data exchange to monitor and control interconnected devices, manufacturers and operators. A discernible transition from non-IoT to IoT devices has been evident over the past decade. Projections indicate that by 2030, approximately 75% of all devices will be integrated into the IoT. Consequently, these devices generate a substantial influx of data, commonly called Big Data. Unlike traditional computing systems, IoT devices operate in diverse, often resource-constrained environments, making them susceptible to weak authentication, insecure communication, physical vulnerabilities, data privacy risks, DoS attacks, malware propagation, and interoperability issues. These concerns can lead to data breaches, unauthorized access, and system disruptions. Cryptography offers an efficacious means of bidirectional data transmission that can enhance the security of IoT devices and the data they transmit and store, employing authentication and key management, encryption, message integrity and authentication, and Post-Quantum cryptography. This manuscript comprehensively examines the security predicaments of the Internet of Things and illustrates the effectiveness of cryptographic methodologies in ameliorating these concerns. This research not only contributes to a comprehensive understanding of existing cryptographic techniques in IoT security but also offers a forward-looking perspective that can guide future research efforts and inform practical implementations. © 2024 by the authors.
Açıklama
Anahtar Kelimeler
cryptography, IoT security, systematic key algorithms
Kaynak
Journal of Communications
WoS Q Değeri
Scopus Q Değeri
Q3
Cilt
19
Sayı
2