• Corpus ID: 224705446

Threats and Corrective Measures for IoT Security with Observance to Cybercrime

@article{Rani2020ThreatsAC,
  title={Threats and Corrective Measures for IoT Security with Observance to Cybercrime},
  author={Sita Rani and Aman Kataria and Smarajit Ghosh and Vinod Karar and Takshi Gupta and Kyungroul Lee and Chang Choi},
  journal={ArXiv},
  year={2020},
  volume={abs/2010.08793}
}
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly in numerous application areas. The stormy expansion of smart devices and their credence for data transfer on wireless mechanics boosts their susceptibility to cyber-attacks. Consequently, the rate of cybercrimes is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit the researchers to identify… 

References

SHOWING 1-10 OF 204 REFERENCES
Security, Cybercrime and Digital Forensics for IoT
TLDR
This chapter presents a review of IoT security and forensics by reviewing the IoT system, discussing building blocks of an IoT device, essential characteristic, communication technologies and challenges of the IoT, and digital forensics.
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
  • Yang Lu, Li D. Xu
  • Computer Science
    IEEE Internet of Things Journal
  • 2019
TLDR
This review provides useful information and insights to researchers and practitioners who are interested in cybersecurity of IoT, including the current research of IoT cybersecurity, IoT cybersecurity architecture and taxonomy, key enabling countermeasures and strategies, major applications in industries, research trends and challenges.
CyberSecurity: A Review of Internet of Things (IoT) Security Issues, Challenges and Techniques
TLDR
The cybersecurity state in IoT domain along with its security challenges are discussed and some security requirements and techniques to overcome these challenges are addressed, and blockchain technology is discussed as a recommended solution to support IoT security.
Advanced Digital Forensic IoT Based Secure Communication
  • Computer Science
    International Journal of Innovative Technology and Exploring Engineering
  • 2020
TLDR
The proposed methodology, which employs an advanced digital forensic approach, describes an improved, efficient, and reliable method to identify the source of the crime and collect evidence responsible for security breach during communication.
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
TLDR
A detailed review of the security-related challenges and sources of threat in the IoT applications is presented and four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
TLDR
A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
TLDR
The security and privacy effects of eight IoT features including the threats they cause, existing solutions to threats and research challenges yet to be solved are discussed and how IoT features affect existing security research is revealed.
IOT SECURITY AND THE ROLE OF AI/ML TO COMBAT EMERGING CYBER THREATS IN CLOUD COMPUTING ENVIRONMENT
TLDR
This research paper will propose a hybrid detection model as a solution approach using artificial intelligence and machine learning (AI/ML) to combat and mitigate IoT cyber threats on cloud computing environments both at the host-based and network level.
Proposed embedded security framework for Internet of Things (IoT)
TLDR
The need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches is highlighted.
Security Framework for IoT End Nodes with Neural Networks
TLDR
An IoT Framework to build trustworthy and secure IoT applications and services is introduced and the applicability of the methodology to secure and protect IoT end nodes providing them with the capabilities for self-monitoring and self-recovering after an external event has occurred is shown.
...
...