What is it about?
With the advancement of innovative technologies, the Internet of Things (IoT) has become quite popular in various applications such as smart homes, smart cities, agriculture, healthcare, and so forth. However, the heterogeneity of IoT protocols can pose security challenges to wireless networks. Thus, we have presented a systematic review of IoT technologies such as ZigBee, Radio Frequency Identification (RFID), Bluetooth, WiFi, Ethernet, AR, embedded subscriber identification modules (E-SIM), and smart sensors, along with their communication protocols, which are part of the IoT-layered architecture. We have bifurcated the IoT-layered architecture into the perception, network, and application layers. Furthermore, we have presented IoT security attacks associated with the perception, network, and application layers of the IoT-layered architecture. Moreover, we have discussed several IoT security solutions, open issues, and research challenges dedicated to the security of IoT networks. IoT security solutions can provide secure and efficient data communication over wireless networks.
Featured Image
Why is it important?
We have bifurcated the IoT-layered architecture into the perception, network, and application layers. Furthermore, we have presented IoT security attacks associated with the perception, network, and application layers of the IoT-layered architecture. IoT security solutions can provide secure and efficient data communication over wireless networks.
Perspectives
Read the Original
This page is a summary of: Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities, Security and Privacy, November 2023, Wiley,
DOI: 10.1002/spy2.354.
You can read the full text:
Contributors
The following have contributed to this page