Cargando…
Internet of Things: Evolution, Concerns and Security Challenges
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and colle...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7962037/ https://www.ncbi.nlm.nih.gov/pubmed/33807724 http://dx.doi.org/10.3390/s21051809 |
_version_ | 1783665390432288768 |
---|---|
author | Malhotra, Parushi Singh, Yashwant Anand, Pooja Bangotra, Deep Kumar Singh, Pradeep Kumar Hong, Wei-Chiang |
author_facet | Malhotra, Parushi Singh, Yashwant Anand, Pooja Bangotra, Deep Kumar Singh, Pradeep Kumar Hong, Wei-Chiang |
author_sort | Malhotra, Parushi |
collection | PubMed |
description | The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications. |
format | Online Article Text |
id | pubmed-7962037 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-79620372021-03-17 Internet of Things: Evolution, Concerns and Security Challenges Malhotra, Parushi Singh, Yashwant Anand, Pooja Bangotra, Deep Kumar Singh, Pradeep Kumar Hong, Wei-Chiang Sensors (Basel) Article The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications. MDPI 2021-03-05 /pmc/articles/PMC7962037/ /pubmed/33807724 http://dx.doi.org/10.3390/s21051809 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Malhotra, Parushi Singh, Yashwant Anand, Pooja Bangotra, Deep Kumar Singh, Pradeep Kumar Hong, Wei-Chiang Internet of Things: Evolution, Concerns and Security Challenges |
title | Internet of Things: Evolution, Concerns and Security Challenges |
title_full | Internet of Things: Evolution, Concerns and Security Challenges |
title_fullStr | Internet of Things: Evolution, Concerns and Security Challenges |
title_full_unstemmed | Internet of Things: Evolution, Concerns and Security Challenges |
title_short | Internet of Things: Evolution, Concerns and Security Challenges |
title_sort | internet of things: evolution, concerns and security challenges |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7962037/ https://www.ncbi.nlm.nih.gov/pubmed/33807724 http://dx.doi.org/10.3390/s21051809 |
work_keys_str_mv | AT malhotraparushi internetofthingsevolutionconcernsandsecuritychallenges AT singhyashwant internetofthingsevolutionconcernsandsecuritychallenges AT anandpooja internetofthingsevolutionconcernsandsecuritychallenges AT bangotradeepkumar internetofthingsevolutionconcernsandsecuritychallenges AT singhpradeepkumar internetofthingsevolutionconcernsandsecuritychallenges AT hongweichiang internetofthingsevolutionconcernsandsecuritychallenges |