z-logo
open-access-imgOpen Access
Review on Trust Building Algorithms in IoT Security
Author(s) -
Haoxiang Wang
Publication year - 2022
Publication title -
journal of ismac the journal of iot in social, mobile, analytics, and cloud
Language(s) - English
Resource type - Journals
ISSN - 2582-1369
DOI - 10.36548/jismac.2021.4.004
Subject(s) - computer science , computer security , internet of things , field (mathematics) , network security , security analysis , security through obscurity , computer security model , security service , physical security , security information and event management , cloud computing security , information security , cloud computing , mathematics , pure mathematics , operating system
IoT security is a combination of physical device security and network security. The objective of the IoT security module is to hide the network from communication vulnerabilities between the transmitter module and the server. Also, the security algorithms are designed to protect the systems from software attacks and physical hardware attacks. The paper explores the ongoing advancements and research in the field of IoT security by analyzing the research limitations and issues of the existing models. The research gaps identified from the literature analysis explores the way where the research on IoT security must be narrowed. Moreover, this paper projects the evolution of security threats in the IoT network, along with the analysis of deep learning models in estimating such threats.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here