A Thakkar, R Lohiya - Archives of Computational Methods in Engineering, 2021 - Springer
… These wide emerging applications in variety of domains raise many securityissues such as … attacks in IoT networks. The paper also discusses securityissues and challenges in IoT. …
… threats, providing the best possible IoT-based services. This paper provides a comprehensive study on IoTsecurityissues, … We reviewed these papers and extracted the most common …
MN Bhuiyan, MM Rahman, MM Billah… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… in IoT-based healthcare methods and reviews the state-of-the-art technologies in detail. Moreover, this review classifies an existing IoT-based healthcare network … to itsapplications [4]. …
… for cloud providers, it is done either ad hoc or with the platform. When multi-tenant … their applications on the same host resource, security, and privacy issues arise from theirapplications. …
… In general, this paper's purpose was to include an overview to summarize up-to-date research contributions on cloud computing and the IoT and itsapplications in our environment and …
MH Kashani, M Madanipour, M Nikravan… - … Computer Applications, 2021 - Elsevier
… In this survey, the authors explained the history of IoT and cloud computing and their applications in healthcare systems in detail, then incorporated them as a new technology to be …
… this review consists of providing a complete overview of the issues and challenges faced in IoT; … The principal components employed to review this work include sources, selection, and …
… Likewise, we propose a new classification of securitythreats and attacks based on new IoT … , we review some future directions that will enable secure and private IoTapplication by …
… etc.); their features, advantages, and challenges, or the possible securityrisks or threats among these applications. … a literature review followed by IoTsecurity and privacy challenges. In …