Detailed Information

Cited 9 time in webofscience Cited 34 time in scopus
Metadata Downloads

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Full metadata record
DC Field Value Language
dc.contributor.authorRani, S.-
dc.contributor.authorKataria, A.-
dc.contributor.authorSharma, V.-
dc.contributor.authorGhosh, S.-
dc.contributor.authorKarar, V.-
dc.contributor.authorLee, Kyungroul-
dc.contributor.authorChoi, Chang-
dc.date.accessioned2021-06-02T00:40:22Z-
dc.date.available2021-06-02T00:40:22Z-
dc.date.created2021-05-24-
dc.date.issued2021-04-28-
dc.identifier.issn1530-8669-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81176-
dc.description.abstractInternet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, and healthcare. The role of advanced technologies like artificial intelligence, machine learning, cloud computing, edge computing, fog computing, and blockchain technology in cybercrime investigation is also discussed. Lastly, various open research challenges in IoT to assist cybercrime investigation are explained to provide a new direction for further research. © 2021 Sita Rani et al.-
dc.language영어-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.relation.isPartOfWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.titleThreats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000674284800008-
dc.identifier.doi10.1155/2021/5579148-
dc.identifier.bibliographicCitationWIRELESS COMMUNICATIONS & MOBILE COMPUTING, v.2021-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85105805445-
dc.citation.titleWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.citation.volume2021-
dc.contributor.affiliatedAuthorChoi, Chang-
dc.type.docTypeReview-
dc.subject.keywordPlusArtificial intelligence-
dc.subject.keywordPlusAutomation-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusData transfer-
dc.subject.keywordPlusEngineering education-
dc.subject.keywordPlusFog computing-
dc.subject.keywordPlusForensic science-
dc.subject.keywordPlusIntelligent buildings-
dc.subject.keywordPlusNetwork architecture-
dc.subject.keywordPlusSecurity of data-
dc.subject.keywordPlusAdvanced technology-
dc.subject.keywordPlusApplication area-
dc.subject.keywordPlusAutomated vehicles-
dc.subject.keywordPlusCorrective measures-
dc.subject.keywordPlusInternet of Things (IOT)-
dc.subject.keywordPlusIot architectures-
dc.subject.keywordPlusResearch challenges-
dc.subject.keywordPlusSecurity threats-
dc.subject.keywordPlusInternet of things-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Choi, Chang photo

Choi, Chang
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE