IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/9bc4c18b4fd34399b066812948043bda |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:9bc4c18b4fd34399b066812948043bda |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:9bc4c18b4fd34399b066812948043bda2021-11-11T15:39:14ZIoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques10.3390/electronics102126472079-9292https://doaj.org/article/9bc4c18b4fd34399b066812948043bda2021-10-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2647https://doaj.org/toc/2079-9292Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.Stefan BaloghOndrej GalloRoderik PloszekPeter ŠpačekPavol ZajacMDPI AGarticleInternet of Thingscloudblockchainpostquantumevolutionartificial intelligenceElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2647, p 2647 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Internet of Things cloud blockchain postquantum evolution artificial intelligence Electronics TK7800-8360 |
spellingShingle |
Internet of Things cloud blockchain postquantum evolution artificial intelligence Electronics TK7800-8360 Stefan Balogh Ondrej Gallo Roderik Ploszek Peter Špaček Pavol Zajac IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
description |
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future. |
format |
article |
author |
Stefan Balogh Ondrej Gallo Roderik Ploszek Peter Špaček Pavol Zajac |
author_facet |
Stefan Balogh Ondrej Gallo Roderik Ploszek Peter Špaček Pavol Zajac |
author_sort |
Stefan Balogh |
title |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
title_short |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
title_full |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
title_fullStr |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
title_full_unstemmed |
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques |
title_sort |
iot security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/9bc4c18b4fd34399b066812948043bda |
work_keys_str_mv |
AT stefanbalogh iotsecuritychallengescloudandblockchainpostquantumcryptographyandevolutionarytechniques AT ondrejgallo iotsecuritychallengescloudandblockchainpostquantumcryptographyandevolutionarytechniques AT roderikploszek iotsecuritychallengescloudandblockchainpostquantumcryptographyandevolutionarytechniques AT peterspacek iotsecuritychallengescloudandblockchainpostquantumcryptographyandevolutionarytechniques AT pavolzajac iotsecuritychallengescloudandblockchainpostquantumcryptographyandevolutionarytechniques |
_version_ |
1718434686455250944 |