Review of Security Challenges Encountered in Internet of Things Technology

Rand Ibrahim Al-Suhimat, Nadia Mohammed Ai, Amer Ibrahim, Nowf O. Maaitah, Nidal A. Al-Dmour

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Most modern Internet applications focus on providing users with access to information, chances for interaction, and entertainment. However, the deployment of networked, intelligent sensor technology is accelerating the development of the Internet of Things (IoT), just like the Internet did years ago. By allowing effective wireless devices, the Internet of Things (loT) is a technology that has revolutionized several industries. As the Internet of Things (loT) develops, security issues such as new attack avenues, vulnerabilities, and-possibly most concurringly-a greatly greater capacity for using remote access to inflict physical harm become a significant issue. This study explores what the Internet of Things is, its future impact, challenges, and opportunities in various fields.

Original languageEnglish
Title of host publication2nd International Conference on Cyber Resilience, ICCR 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350394962
DOIs
Publication statusPublished - 2024
Externally publishedYes
Event2nd International Conference on Cyber Resilience, ICCR 2024 - Dubai, United Arab Emirates
Duration: Feb 26 2024Feb 28 2024

Publication series

Name2nd International Conference on Cyber Resilience, ICCR 2024

Conference

Conference2nd International Conference on Cyber Resilience, ICCR 2024
Country/TerritoryUnited Arab Emirates
CityDubai
Period2/26/242/28/24

Keywords

  • 5G
  • Communications
  • loT
  • Security
  • smart cities
  • Wireless

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Safety, Risk, Reliability and Quality
  • Social Sciences (miscellaneous)
  • Education
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Review of Security Challenges Encountered in Internet of Things Technology'. Together they form a unique fingerprint.

Cite this