Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Figure 7

Protocols of different layers in IoT [71, 79, 101, 215].