Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

IoT: Communication Protocols and Security Threats

Version 1 : Received: 11 November 2021 / Approved: 12 November 2021 / Online: 12 November 2021 (11:28:01 CET)
Version 2 : Received: 5 January 2022 / Approved: 5 January 2022 / Online: 5 January 2022 (15:38:52 CET)

A peer-reviewed article of this Preprint also exists.

Gerodimos, A.; Maglaras, L.; Ferrag, M.A.; Ayres, N.; Kantzavelou, I. IoT: Communication Protocols and Security Threats. Internet of Things and Cyber-Physical Systems 2023, 3, 1–13, doi:10.1016/j.iotcps.2022.12.003. Gerodimos, A.; Maglaras, L.; Ferrag, M.A.; Ayres, N.; Kantzavelou, I. IoT: Communication Protocols and Security Threats. Internet of Things and Cyber-Physical Systems 2023, 3, 1–13, doi:10.1016/j.iotcps.2022.12.003.

Abstract

The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.

Keywords

IoT; Security; Protocols

Subject

Engineering, Electrical and Electronic Engineering

Comments (1)

Comment 1
Received: 5 January 2022
Commenter: Leandros Maglaras
Commenter's Conflict of Interests: Author
Comment: Changes in the text, figures and authors. The article is now submitted to MDPI IoT
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 1
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.