Cyber Security Threats to IoT Applications and Service Domains

Samuel Tweneboah-Koduah, Knud Erik Skouby*, Reza Tadayoni

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

91 Citations (Scopus)

Abstract

We are currently living in the post-PC era where smartphones and other wireless handheld devices are changing our environment, making it more interactive, adaptive and informative. Termed as Internet of Things (IoT) evolving into Internet of Everything, the new ecosystem combines wireless sensor networks, cloud computing, analytical data, interactive technologies, as well as smart devices, to provision solutions in which the objects are embedded with network connectivity and an identifier to enhance object-to-object interactions. IoT innovation is advancing and provides diverse smart solutions or applications. From e-transport to e-health; smart living to e-manufacturing and many other e-solutions. In this environment, the rising trend of cyber attacks on systems infrastructure coupled with the system inherent vulnerabilities presents a source of concern not only to the vendors, but also to the consumer. These security concerns need to be addressed in order to ensure user confidence so as to promote wide acceptance and reap the potentials of IoT. From the perspectives of firmware, hardware and software infrastructure setups, this paper looks at some of the major IoT application and service domains, and analyze the cybersecurity challenges which are likely to drive IoT research in the near future.

Original languageEnglish
JournalWireless Personal Communications
Volume95
Issue number1
Pages (from-to)169-185
Number of pages17
ISSN0929-6212
DOIs
Publication statusPublished - 1 Jul 2017

Keywords

  • Cyber threats
  • Internet of Everything
  • Internet of Things
  • IoT applications
  • IoT infrastructure
  • Systems vulnerabilities

Fingerprint

Dive into the research topics of 'Cyber Security Threats to IoT Applications and Service Domains'. Together they form a unique fingerprint.

Cite this