- مبلغ: ۸۶,۰۰۰ تومان
- مبلغ: ۹۱,۰۰۰ تومان
With the increasing miniaturization of smartphones, computers, and sensors in the Internet of Things (IoT) paradigm, strengthening the security and preventing ransomware attacks have become key concerns. Traditional security mechanisms are no longer applicable because of the involvement of resource-constrained devices, which require more computation power and resources. This paper presents the ransomware attacks and security concerns in IoT. We initially discuss the rise of ransomware attacks and outline the associated challenges. Then, we investigate, report, and highlight the state-of-the-art research efforts directed at IoT from a security perspective. A taxonomy is devised by classifying and categorizing the literature based on important parameters (e.g., threats, requirements, IEEE standards, deployment level, and technologies). Furthermore, a few credible case studies are outlined to alert people regarding how seriously IoT devices are vulnerable to threats. We enumerate the requirements that need to be met for securing IoT. Several indispensable open research challenges (e.g., data integrity, lightweight security mechanisms, lack of security software’s upgradability and patchability features, physical protection of trillions of devices, privacy, and trust), are identified and discussed. Several prominent future research directions are provided.
Remarkable advances in smart technologies have paved the way toward a new computing paradigm called the IoT. This study discussed the ransomware attacks and security concerns in IoT. First, we discussed the rise of ransomware attacks and outlined the associated challenges. Second, we investigated, reported, and highlighted the state-of-the-art research efforts on IoT security. Third, a taxonomy is devised by classifying and categorizing the literature. Fourth, a few credible case studies are presented to alert people on the vulnerability of IoT devices to threats. Fifth, we enumerated the requirements for securing the IoT. Sixth, several indispensable research challenges are identified and discussed. Seventh, several prominent research directions are provided. Finally, we conclude that although IoT can facilitate different aspects of lives of people, most IoT devices are vulnerable to ransomware attacks. Therefore, strengthening of the IoT security and mitigation of ransomware attacks should be given great importance to build user trust in the IoT.