What is it about?

With the advancement of innovative technologies, the Internet of Things (IoT) has become quite popular in various applications such as smart homes, smart cities, agriculture, healthcare, and so forth. However, the heterogeneity of IoT protocols can pose security challenges to wireless networks. Thus, we have presented a systematic review of IoT technologies such as ZigBee, Radio Frequency Identification (RFID), Bluetooth, WiFi, Ethernet, AR, embedded subscriber identification modules (E-SIM), and smart sensors, along with their communication protocols, which are part of the IoT-layered architecture. We have bifurcated the IoT-layered architecture into the perception, network, and application layers. Furthermore, we have presented IoT security attacks associated with the perception, network, and application layers of the IoT-layered architecture. Moreover, we have discussed several IoT security solutions, open issues, and research challenges dedicated to the security of IoT networks. IoT security solutions can provide secure and efficient data communication over wireless networks.

Featured Image

Why is it important?

We have bifurcated the IoT-layered architecture into the perception, network, and application layers. Furthermore, we have presented IoT security attacks associated with the perception, network, and application layers of the IoT-layered architecture. IoT security solutions can provide secure and efficient data communication over wireless networks.

Perspectives

Writing this article was a great pleasure as it has co-authors with whom I have had long standing collaborations.

Nagendar Yamsani
SR University, Warangal

Read the Original

This page is a summary of: Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities, Security and Privacy, November 2023, Wiley,
DOI: 10.1002/spy2.354.
You can read the full text:

Read

Contributors

The following have contributed to this page