Koyuncu, MuratBinglaw,F.Koyuncu,M.Pusatlı,T.Information Systems Engineering2024-07-052024-07-0520220978-303095986-91867-821110.1007/978-3-030-95987-6_62-s2.0-85135011523https://doi.org/10.1007/978-3-030-95987-6_6https://hdl.handle.net/20.500.14411/4070The Internet of Things (IoT) is a relatively new concept as it connects things (or objects) that do not have high computational power. The IoT helps these things see, listen, and take action by interoperating with minimal human intervention to make people’s lives easier. However, these systems are vulnerable to attacks and security threats that could potentially undermine consumer confidence in them. For this reason, it is critical to understand the characteristics of IoT security and their requirements before starting to discuss how to protect them. In this scope, the present work reviews the importance of security in IoT applications, factors that restrict the use of traditional security methods to protect IoTs, and the basic requirements necessary to judge them as secure environments. © 2022, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.eninfo:eu-repo/semantics/closedAccessInternet of ThingsIoTSecuritySecurity requirementsSecurity Requirements in IoT EnvironmentsConference ObjectQ4421 LNICST8496