Security and Privacy Challenges in IOT: A Global Perspective
Main Article Content
Abstract
The fast development of the Internet of Things (IoT) has delivered various open doors and advantages across different businesses. Nevertheless, this interconnected biological system of gadgets likewise presents critical security and protection moves that should be tended to on a worldwide scale. This paper looks at the security and protection challenges looked at by IoT frameworks according to a worldwide point of view. Security chances are one more huge worry in the IoT scene. The assortment, stockpiling, and handling of individual information by IoT gadgets bring up issues about individual security privileges. Unapproved admittance to this information can bring about private profiling, reconnaissance, and abuse. Executing security-saving systems like information anonymization, encryption, and client-driven control is fundamental to protecting security in IoT conditions. Administrative systems and guidelines likewise assume a critical part in tending to IoT security and protection challenges. Guidelines like the Overall Information Assurance Guideline (GDPR) in the European Association assist with implementing information security measures and defending client privileges. Be that as it may, variations in guidelines across locales can introduce difficulties for worldwide IoT arrangements. Fitting guidelines and structures can advance consistency and work with worldwide participation. The paper likewise investigates the capability of arising advances in upgrading IoT security and protection. Advancements, for example, block chain, edge registering, and united learning offer promising arrangements. Block chain’s decentralized and alter safe nature can give secure information stockpiling and exchange the executives. Edge registering decreases dormancy and information openness by handling information nearer to the source. Combined learning empowers cooperative model preparation while protecting information security. Coordinating these innovations into IoT frameworks can add to a safer and protection-mindful worldwide IoT biological system.
Downloads
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
P. Tuwanut and S. Kraijak, “A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends,” in 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China: Institution of Engineering and Technology, 2015, p. 6 .-6 . doi: 10.1049/cp.2015.0714.
H. A. Abdul-Ghani and D. Konstantas, “A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective,” J. Sens. Actuator Netw., vol. 8, no. 2, p. 22, Apr. 2019, doi: 10.3390/jsan8020022.
A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. Moreno, “A decentralized approach for security and privacy challenges in the Internet of Things,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea (South): IEEE, Mar. 2014, pp. 67–72. doi: 10.1109/WF-IoT.2014.6803122.
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things,” IEEE Internet Things J., vol. 4, no. 5, pp. 1250–1258, Oct. 2017, doi: 10.1109/JIOT.2017.2694844.
A. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, “A roadmap for security challenges in the Internet of Things,” Digit. Commun. Netw., vol. 4, no. 2, pp. 118–137, 2018.
H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, “A survey on internet of things security: Requirements, challenges, and solutions,” Internet Things, vol. 14, p. 100129, 2021.
A. B. Pawar and S. Ghumbre, “A survey on IoT applications, security challenges and counter measures,” in 2016 international conference on computing, analytics and security trends (CAST), IEEE, 2016, pp. 294–299. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7914983/
V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IoT security: application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019.
R. Kumar, P. Kumar, and V. Singhal, “A survey: Review of cloud IoT security techniques, issues and challenges,” in Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), 2019. Accessed: Mar. 29, 2024. [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3350995
W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, “An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security,” IEEE Internet Things J., vol. 7, no. 10, pp. 10250–10276, 2020.
T. Mazhar et al., “Analysis of IoT security challenges and its solutions using artificial intelligence,” Brain Sci., vol. 13, no. 4, p. 683, 2023.
B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Addressing Security and Privacy Issues of IoT Using Blockchain Technology,” IEEE Internet Things J., vol. 8, no. 2, pp. 881–888, Jan. 2021, doi: 10.1109/JIOT.2020.3008906.
W. H. Hassan, “Current research on Internet of Things (IoT) security: A survey,” Comput. Netw., vol. 148, pp. 283–294, 2019.
K. Kimani, V. Oduol, and K. Langat, “Cyber security challenges for IoT-based smart grid networks,” Int. J. Crit. Infrastruct. Prot., vol. 25, pp. 36–49, 2019.
M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet Things J., vol. 5, no. 4, pp. 2483–2495, 2017.
S. N. Mohanty et al., “An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy,” Future Gener. Comput. Syst., vol. 102, pp. 1027–1037, Jan. 2020, doi: 10.1016/j.future.2019.09.050.
R. C. Poonia, “Internet of Things (IoT) security challenges,” in Handbook of e-business security, Auerbach Publications, 2018, pp. 191–223. Accessed: Mar. 29, 2024. [Online]. Available: https://www.taylorfrancis.com/chapters/edit/10.1201/9780429468254-8/internet-things-iot-security-challenges-ramesh-poonia
F. Al‐Turjman, H. Zahmatkesh, and R. Shahroze, “An overview of security and privacy in smart cities’ IoT communications,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, Mar. 2022, doi: 10.1002/ett.3677.
R. F. Ali, A. Muneer, P. D. D. Dominic, S. M. Taib, and E. A. A. Ghaleb, “Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review,” in Advances in Cyber Security, vol. 1487, N. Abdullah, S. Manickam, and M. Anbar, Eds., in Communications in Computer and Information Science, vol. 1487. , Singapore: Springer Singapore, 2021, pp. 128–154. doi: 10.1007/978-981-16-8059-5_9.
A. Karale, “The challenges of IoT addressing security, ethics, privacy, and laws,” Internet Things, vol. 15, p. 100420, 2021.
M. S. Virat, S. M. Bindu, B. Aishwarya, B. N. Dhanush, and M. R. Kounte, “Security and privacy challenges in internet of things,” in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, 2018, pp. 454–460. Accessed: Jun. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8553919/
A. Assiri and H. Almagwashi, “IoT security and privacy issues,” in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), IEEE, 2018, pp. 1–5. Accessed: Jun. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8442002/
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,” Appl. Sci., vol. 10, no. 12, p. 4102, 2020.
P. M. Chanal and M. S. Kakkasageri, “Security and Privacy in IoT: A Survey,” Wirel. Pers. Commun., vol. 115, no. 2, pp. 1667–1693, Nov. 2020, doi: 10.1007/s11277-020-07649-9.
R. H. Weber, “Internet of Things–New security and privacy challenges,” Comput. Law Secur. Rev., vol. 26, no. 1, pp. 23–30, 2010.
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: Challenges,” IEEE Commun. Mag., vol. 55, no. 1, pp. 26–33, 2017.
N. Alhalafi and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review,” in IOP conference series: Earth and environmental science, IOP Publishing, 2019, p. 012013. Accessed: Jun. 28, 2024. [Online]. Available: https://iopscience.iop.org/article/10.1088/1755-1315/322/1/012013/meta
M. L. Das, “Privacy and Security Challenges in Internet of Things,” in Distributed Computing and Internet Technology, vol. 8956, R. Natarajan, G. Barua, and M. R. Patra, Eds., in Lecture Notes in Computer Science, vol. 8956. , Cham: Springer International Publishing, 2015, pp. 33–48. doi: 10.1007/978-3-319-14977-6_3.
N. Hasan, A. Chamoli, and M. Alam, “Privacy Challenges and Their Solutions in IoT,” in Internet of Things (IoT), M. Alam, K. A. Shakil, and S. Khan, Eds., Cham: Springer International Publishing, 2020, pp. 219–231. doi: 10.1007/978-3-030-37468-6_11.
H. Lin and N. W. Bergmann, “IoT privacy and security challenges for smart home environments,” Information, vol. 7, no. 3, p. 44, 2016.
N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Comput. Sci., vol. 132, pp. 1815–1823, 2018, doi: 10.1016/j.procs.2018.05.140.
Y. Yu, Y. Li, J. Tian, and J. Liu, “Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things,” IEEE Wirel. Commun., vol. 25, no. 6, pp. 12–18, Dec. 2018, doi: 10.1109/MWC.2017.1800116.
T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: current status, challenges and countermeasures,” Int. J. Inf. Secur. Res. IJISR, vol. 5, no. 4, pp. 608–616, 2015.
R. H. Weber, “Internet of Things – New security and privacy challenges,” Comput. Law Secur. Rev., vol. 26, no. 1, pp. 23–30, Jan. 2010, doi: 10.1016/j.clsr.2009.11.008.
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective measures,” in 2015 10th international conference for internet technology and secured transactions (ICITST), IEEE, 2015, pp. 336–341. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7412116/
S. Singh and N. Singh, “Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce,” in 2015 International conference on green computing and internet of things (ICGCIoT), Ieee, 2015, pp. 1577–1581. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7380718/
H. Wang, Z. Zhang, and T. Taleb, “Editorial: Special Issue on Security and Privacy of IoT,” World Wide Web, vol. 21, no. 1, pp. 1–6, Jan. 2018, doi: 10.1007/s11280-017-0490-9.
E. Shaikh, I. Mohiuddin, and A. Manzoor, “Internet of Things (IoT): Security and Privacy Threats,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia: IEEE, May 2019, pp. 1–6. doi: 10.1109/CAIS.2019.8769539.
I. Yaqoob et al., “Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges,” IEEE Wirel. Commun., vol. 24, no. 3, pp. 10–16, Jun. 2017, doi: 10.1109/MWC.2017.1600421.
M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, “Internet of things security: challenges and key issues,” Secur. Commun. Netw., vol. 2021, pp. 1–11, 2021.
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications,” IEEE Commun. Surv. Tutor., vol. 17, no. 4, pp. 2347–2376, 2015, doi: 10.1109/COMST.2015.2444095.
N. Miloslavskaya and A. Tolstoy, “Internet of Things: information security challenges and solutions,” Clust. Comput., vol. 22, no. 1, pp. 103–119, Mar. 2019, doi: 10.1007/s10586-018-2823-6.
P. Goyal, A. K. Sahoo, T. K. Sharma, and P. K. Singh, “Internet of Things: Applications, security and privacy: A survey,” Mater. Today Proc., vol. 34, pp. 752–759, 2021, doi: 10.1016/j.matpr.2020.04.737.
D. Mendez Mena, I. Papapanagiotou, and B. Yang, “Internet of things: Survey on security,” Inf. Secur. J. Glob. Perspect., vol. 27, no. 3, pp. 162–182, May 2018, doi: 10.1080/19393555.2018.1458258.
D. M. Mendez, I. Papapanagiotou, and B. Yang, “Internet of Things: Survey on Security and Privacy,” 2017, doi: 10.48550/ARXIV.1707.01879.
I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of Things: Security vulnerabilities and challenges,” in 2015 IEEE symposium on computers and communication (ISCC), IEEE, 2015, pp. 180–187. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7405513/
B. Khoo, “RFID as an Enabler of the Internet of Things: Issues of Security and Privacy,” in 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China: IEEE, Oct. 2011, pp. 709–712. doi: 10.1109/iThings/CPSCom.2011.83.
H. Lin and N. W. Bergmann, “IoT privacy and security challenges for smart home environments,” Information, vol. 7, no. 3, p. 44, 2016.
A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proceedings of the 52nd Annual Design Automation Conference, San Francisco California: ACM, Jun. 2015, pp. 1–6. doi: 10.1145/2744769.2747942.
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,” Appl. Sci., vol. 10, no. 12, p. 4102, 2020.
H. C. Chen, M. A. A. Faruque, and P. H. Chou, “Security and privacy challenges in IoT-based machine-to-machine collaborative scenarios,” in Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, Pittsburgh Pennsylvania: ACM, Oct. 2016, pp. 1–2. doi: 10.1145/2968456.2974008.
A. Cirne, P. R. Sousa, J. S. Resende, and L. Antunes, “IoT security certifications: Challenges and potential approaches,” Comput. Secur., vol. 116, p. 102669, 2022.
Z. Xihua and Dr. S. B. Goyal, “Security and Privacy Challenges using IoT-Blockchain Technology in a Smart City: Critical Analysis,” Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 190–195, Jun. 2022, doi: 10.37391/ijeer.100224.
A. M. Abuagoub, “IoT security evolution: challenges and countermeasures review,” Int. J. Commun. Netw. Inf. Secur., vol. 11, no. 3, pp. 342–351, 2019.
M. Abomhara and G. M. Koien, “Security and privacy in the Internet of Things: Current status and open issues,” in 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, Denmark: IEEE, May 2014, pp. 1–8. doi: 10.1109/PRISMS.2014.6970594.
J. Mohanty, S. Mishra, S. Patra, B. Pati, and C. R. Panigrahi, “IoT Security, Challenges, and Solutions: A Review,” in Progress in Advanced Computing and Intelligent Engineering, vol. 1199, C. R. Panigrahi, B. Pati, P. Mohapatra, R. Buyya, and K.-C. Li, Eds., in Advances in Intelligent Systems and Computing, vol. 1199. , Singapore: Springer Singapore, 2021, pp. 493–504. doi: 10.1007/978-981-15-6353-9_46.
M. M. Ahemd, M. A. Shah, and A. Wahid, “IoT security: A layered approach for attacks & defenses,” in 2017 international conference on Communication Technologies (ComTech), IEEE, 2017, pp. 104–110. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8065757/
D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, “Security and privacy issues for an IoT based smart home,” in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia: IEEE, May 2017, pp. 1292–1297. doi: 10.23919/MIPRO.2017.7973622.
A. Uprety and D. B. Rawat, “Reinforcement learning for iot security: A comprehensive survey,” IEEE Internet Things J., vol. 8, no. 11, pp. 8693–8706, 2020.
A. Karale, “The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws,” Internet Things, vol. 15, p. 100420, Sep. 2021, doi: 10.1016/j.iot.2021.100420.
M. Litoussi, N. Kannouf, K. El Makkaoui, A. Ezzati, and M. Fartitchou, “IoT security: challenges and countermeasures,” Procedia Comput. Sci., vol. 177, pp. 503–508, 2020.
N. Fabiano, “The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard,” in 2017 International Conference on Internet of Things for the Global Community (IoTGC), Funchal, Portugal: IEEE, Jul. 2017, pp. 1–7. doi: 10.1109/IoTGC.2017.8008970.
M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Gener. Comput. Syst., vol. 82, pp. 395–411, 2018.
R. Sachdev, “Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments,” in 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France: IEEE, Apr. 2020, pp. 341–346. doi: 10.1109/FMEC49853.2020.9144755.
T. Fernández-Caramés and P. Fraga-Lamas, “Towards The Internet-of-Smart-Clothing: A Review on IoT Wearables and Garments for Creating Intelligent Connected E-Textiles,” Electronics, vol. 7, no. 12, p. 405, Dec. 2018, doi: 10.3390/electronics7120405.
K. Xu and H. Zhu, Eds., Wireless algorithms, systems, and applications: 10th international conference, WASA 2015, Qufu, China, August 10 - 12, 2015 ; proceedings. in Lecture notes in computer science, no. 9204. Cham: Springer, 2015.
A. H. Mohammed, Raad. M. Khaleefah, M. K. Hussein, and I. Amjad Abdulateef, “A Review Software Defined Networking for Internet of Things,” in 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey: IEEE, Jun. 2020, pp. 1–8. doi: 10.1109/HORA49412.2020.9152862.
M. A. Tunc, E. Gures, and I. Shayea, “A Survey on IoT Smart Healthcare: Emerging Technologies, Applications, Challenges, and Future Trends,” 2021, doi: 10.48550/ARXIV.2109.02042.
M. Kumaresan, R. Gopal, M. Mathivanan, and T. Poongodi, “Amalgamation of blockchain, IoT, and 5G to improve security and privacy of smart healthcare systems,” in Blockchain Applications for Healthcare Informatics, Elsevier, 2022, pp. 283–312. doi: 10.1016/B978-0-323-90615-9.00015-3.
I. O. Ebo, O. J. Falana, O. Taiwo, and B. A. Olumuyiwa, “An Enhanced Secured IOT Model for Enterprise Architecture,” in 2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), Ayobo, Ipaja, Lagos, Nigeria: IEEE, Mar. 2020, pp. 1–6. doi: 10.1109/ICMCECS47690.2020.247112.
F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine learning in IoT security: Current solutions and future challenges,” IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1686–1721, 2020.
L. F. A. Roman and P. R. L. Gondim, “Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment,” Ad Hoc Netw., vol. 97, p. 102004, Feb. 2020, doi: 10.1016/j.adhoc.2019.102004.
V. Skwarek, “Blockchains as security-enabler for industrial IoT-applications,” Asia Pac. J. Innov. Entrep., vol. 11, no. 3, pp. 301–311, Dec. 2017, doi: 10.1108/APJIE-12-2017-035.
K. Sha, W. Wei, T. A. Yang, Z. Wang, and W. Shi, “On security challenges and open issues in Internet of Things,” Future Gener. Comput. Syst., vol. 83, pp. 326–337, 2018.
A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, “Security Challenges and Concerns of Internet of Things (IoT),” in Cyber-Physical Systems: Architecture, Security and Application, S. Guo and D. Zeng, Eds., in EAI/Springer Innovations in Communication and Computing. , Cham: Springer International Publishing, 2019, pp. 153–185. doi: 10.1007/978-3-319-92564-6_7.
D. Prat et al., “CHEM21 selection guide of classical- and less classical-solvents,” Green Chem., vol. 18, no. 1, pp. 288–296, 2016, doi: 10.1039/C5GC01008J.
S. I. Al-Sharekh and K. H. Al-Shqeerat, “Security challenges and limitations in IoT environments,” Int J Comput Sci Netw Secur, vol. 19, no. 2, pp. 193–199, 2019.
A. Sajid, H. Abbas, and K. Saleem, “Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges,” IEEE Access, vol. 4, pp. 1375–1384, 2016, doi: 10.1109/ACCESS.2016.2549047.
H. R. Dananjaya, M. Fabio, and M. Fakhrezzy, “Coordination of Global Approach for Blockchain Supply Chains,” Blockchain Front. Technol., vol. 2, no. 1, pp. 72–83, Aug. 2022, doi: 10.34306/bfront.v2i1.116.
S. K. Singh, C. Lee, and J. H. Park, “CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing,” Comput. Ind. Eng., vol. 166, p. 107967, Apr. 2022, doi: 10.1016/j.cie.2022.107967.
A. Jain and T. Singh, “Security Challenges and Solutions of IoT Ecosystem,” in Information and Communication Technology for Sustainable Development, vol. 933, M. Tuba, S. Akashe, and A. Joshi, Eds., in Advances in Intelligent Systems and Computing, vol. 933. , Singapore: Springer Singapore, 2020, pp. 259–270. doi: 10.1007/978-981-13-7166-0_25.
C. Patel and N. Doshi, “Security Challenges in IoT Cyber World,” in Security in Smart Cities: Models, Applications, and Challenges, A. E. Hassanien, M. Elhoseny, S. H. Ahmed, and A. K. Singh, Eds., in Lecture Notes in Intelligent Transportation and Infrastructure. , Cham: Springer International Publishing, 2019, pp. 171–191. doi: 10.1007/978-3-030-01560-2_8.
K. Kimani, V. Oduol, and K. Langat, “Cyber security challenges for IoT-based smart grid networks,” Int. J. Crit. Infrastruct. Prot., vol. 25, pp. 36–49, Jun. 2019, doi: 10.1016/j.ijcip.2019.01.001.
K. Tabassum, A. Ibrahim, and S. A. El Rahman, “Security issues and challenges in IoT,” in 2019 International Conference on Computer and Information Sciences (ICCIS), IEEE, 2019, pp. 1–5. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8716460/
E. Bertino, “Data privacy for IoT systems: Concepts, approaches, and research directions,” in 2016 IEEE International Conference on Big Data (Big Data), Washington DC,USA: IEEE, Dec. 2016, pp. 3645–3647. doi: 10.1109/BigData.2016.7841030.
T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT systems: Design challenges and opportunities,” in 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), IEEE, 2014, pp. 417–423. Accessed: Mar. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7001385/
S. Park, E. Rosca, and N. Agarwal, “Driving social impact at the bottom of the Pyramid through the internet-of-things enabled frugal innovations,” Technovation, vol. 118, p. 102381, Dec. 2022, doi: 10.1016/j.technovation.2021.102381.
A. Vaseashta, “Emerging sensor technologies for monitoring water quality,” in Applications of Nanomaterials for Water Quality, Unitec House, 2 Albert Place, London N3 1QB, UK: Future Science Ltd, 2013, pp. 66–84. doi: 10.4155/ebo.13.208.
Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wirel. Netw., vol. 20, no. 8, pp. 2481–2501, Nov. 2014, doi: 10.1007/s11276-014-0761-7.
R. Strong, J. T. Wynn, J. R. Lindner, and K. Palmer, “Evaluating Brazilian Agriculturalists’ IoT Smart Agriculture Adoption Barriers: Understanding Stakeholder Salience Prior to Launching an Innovation,” Sensors, vol. 22, no. 18, p. 6833, Sep. 2022, doi: 10.3390/s22186833.
R. El-Haddadeh, V. Weerakkody, M. Osmani, D. Thakker, and K. K. Kapoor, “Examining citizens’ perceived value of internet of things technologies in facilitating public sector services engagement,” Gov. Inf. Q., vol. 36, no. 2, pp. 310–320, Apr. 2019, doi: 10.1016/j.giq.2018.09.009.
H. Touqeer, S. Zaman, R. Amin, M. Hussain, F. Al-Turjman, and M. Bilal, “Smart home security: challenges, issues and solutions at different IoT layers,” J. Supercomput., vol. 77, no. 12, pp. 14053–14089, Dec. 2021, doi: 10.1007/s11227-021-03825-1.
A. Haddud, A. DeSouza, A. Khare, and H. Lee, “Examining potential benefits and challenges associated with the Internet of Things integration in supply chains,” J. Manuf. Technol. Manag., vol. 28, no. 8, pp. 1055–1085, Oct. 2017, doi: 10.1108/JMTM-05-2017-0094.
J. Ahern, “From fail-safe to safe-to-fail: Sustainability and resilience in the new urban world,” Landsc. Urban Plan., vol. 100, no. 4, pp. 341–343, Apr. 2011, doi: 10.1016/j.landurbplan.2011.02.021.
B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet Things, vol. 11, p. 100227, 2020.
A. Karale, “The challenges of IoT addressing security, ethics, privacy, and laws,” Internet Things, vol. 15, p. 100420, 2021.
W. Ferrell, K. Ellis, P. Kaminsky, and C. Rainwater, “Horizontal collaboration: opportunities for improved logistics planning,” Int. J. Prod. Res., vol. 58, no. 14, pp. 4267–4284, Jul. 2020, doi: 10.1080/00207543.2019.1651457.
I. Lee, “Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management,” Future Internet, vol. 12, no. 9, p. 157, Sep. 2020, doi: 10.3390/fi12090157.
A. Scarfò, “The cyber security challenges in the IoT era,” in Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Elsevier, 2018, pp. 53–76. Accessed: Mar. 29, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/B9780128113738000033
M. Thibaud, H. Chi, W. Zhou, and S. Piramuthu, “Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review,” Decis. Support Syst., vol. 108, pp. 79–95, Apr. 2018, doi: 10.1016/j.dss.2018.02.005.
E. Bertino, K.-K. R. Choo, D. Georgakopolous, and S. Nepal, “Internet of Things (IoT): Smart and Secure Service Delivery,” ACM Trans. Internet Technol., vol. 16, no. 4, pp. 1–7, Dec. 2016, doi: 10.1145/3013520.
S. Hameed, F. I. Khan, and B. Hameed, “Understanding security requirements and challenges in Internet of Things (IoT): A review,” J. Comput. Netw. Commun., vol. 2019, pp. 1–14, 2019.
E. Bertino, K.-K. R. Choo, D. Georgakopolous, and S. Nepal, “Internet of Things (IoT): Smart and Secure Service Delivery,” ACM Trans. Internet Technol., vol. 16, no. 4, pp. 1–7, Dec. 2016, doi: 10.1145/3013520.
X. Yu, B. Nguyen, and Y. Chen, “Internet of things capability and alliance: Entrepreneurial orientation, market orientation and product and process innovation,” Internet Res., vol. 26, no. 2, pp. 402–434, Apr. 2016, doi: 10.1108/IntR-10-2014-0265.
H. Jamali-Rad and X. Campman, “Internet of Things-based wireless networking for seismic applications: IoT-based wireless networking,” Geophys. Prospect., vol. 66, no. 4, pp. 833–853, May 2018, doi: 10.1111/1365-2478.12617.
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and Security: Challenges and Solutions,” Appl. Sci., vol. 10, no. 12, p. 4102, Jun. 2020, doi: 10.3390/app10124102.
L. Belli et al., “IoT-Enabled Smart Sustainable Cities: Challenges and Approaches,” Smart Cities, vol. 3, no. 3, pp. 1039–1071, Sep. 2020, doi: 10.3390/smartcities3030052.
V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, “Network-level security and privacy control for smart-home IoT devices,” in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates: IEEE, Oct. 2015, pp. 163–167. doi: 10.1109/WiMOB.2015.7347956.
S. Aggarwal and N. Kumar, “Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges,” Comput. Commun., vol. 149, pp. 270–299, Jan. 2020, doi: 10.1016/j.comcom.2019.10.014.
F. P. Carvalho, “Pesticides, environment, and food safety,” Food Energy Secur., vol. 6, no. 2, pp. 48–60, May 2017, doi: 10.1002/fes3.108.
J. Shi, “Research on Optimization of Cross-Border e-Commerce Logistics Distribution Network in the Context of Artificial Intelligence,” Mob. Inf. Syst., vol. 2022, pp. 1–11, Aug. 2022, doi: 10.1155/2022/3022280.
Y. Sutcu, Q. Li, and N. Memon, “Secure Biometric Templates from Fingerprint-Face Features,” in 2007 IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, MN, USA: IEEE, Jun. 2007, pp. 1–6. doi: 10.1109/CVPR.2007.383385.
A. Kumari and S. Tanwar, “Secure data analytics for smart grid systems in a sustainable smart city: Challenges, solutions, and future directions,” Sustain. Comput. Inform. Syst., vol. 28, p. 100427, Dec. 2020, doi: 10.1016/j.suscom.2020.100427.
D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,” J. Netw. Comput. Appl., vol. 66, pp. 198–213, May 2016, doi: 10.1016/j.jnca.2016.03.006.
D. Ding, Q.-L. Han, X. Ge, and J. Wang, “Secure State Estimation and Control of Cyber-Physical Systems: A Survey,” IEEE Trans. Syst. Man Cybern. Syst., vol. 51, no. 1, pp. 176–190, Jan. 2021, doi: 10.1109/TSMC.2020.3041121.
W. Steffen et al., “The Anthropocene: From Global Change to Planetary Stewardship,” AMBIO, vol. 40, no. 7, pp. 739–761, Nov. 2011, doi: 10.1007/s13280-011-0185-x.
Y. Zhou, “The Application Trend of Digital Finance and Technological Innovation in the Development of Green Economy,” J. Environ. Public Health, vol. 2022, pp. 1–8, Jul. 2022, doi: 10.1155/2022/1064558.
I. Yaqoob et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Comput. Netw., vol. 129, pp. 444–458, Dec. 2017, doi: 10.1016/j.comnet.2017.09.003.
A. Heiskanen, “The technology of trust: How the Internet of Things and blockchain could usher in a new era of construction productivity,” Constr. Res. Innov., vol. 8, no. 2, pp. 66–70, Apr. 2017, doi: 10.1080/20450249.2017.1337349.
N. Petrovsky and J. C. Aguilar, “Vaccine adjuvants: Current state and future trends,” Immunol. Cell Biol., vol. 82, no. 5, pp. 488–496, Oct. 2004, doi: 10.1111/j.0818-9641.2004.01272.x.
A. K. Biswas and C. Tortajada, “Water quality management: a globally neglected issue,” Int. J. Water Resour. Dev., vol. 35, no. 6, pp. 913–916, Nov. 2019, doi: 10.1080/07900627.2019.1670506.
M. O. Harhay, “Water Stress and Water Scarcity: A Global Problem,” Am. J. Public Health, vol. 101, no. 8, pp. 1348–1349, Aug. 2011, doi: 10.2105/AJPH.2011.300277.