A survey on IoT security: application areas, security threats and solution architectures

  Samoa Digital Library

Saini i totonu

English Samoan

  • Samoa Digital Library
  • Library
  • Journal Articles
  • View Item

JavaScript is disabled for your browser. Some features of this site may not work without it.

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija;Vinay Chamola;Vikas Saxena;Divyansh Jain;Pranav Goyal;Biplab Sikdar

URI: ${sadil.baseUrl}/handle/123456789/3389

Date: 2019

Show full item record

Files in this item

A survey on IoT security: application areas, security threats and solution architectures

Name: 18.pdf

Size: 3.858Mb

Format: PDF

View/Open

This item appears in the following Collection(s)

  • Journal Articles

Saili Sadil

Saili Sadil
Fa'amaumauga e fasino i tusi ia

Vaavaai

  • Sadil atoa

    • Famaumauga
    • Aso / Tausaga
    • Tusitala
    • Ulutala
    • Mataupu
  • This Collection

    • Aso / Tausaga
    • Tusitala
    • Ulutala
    • Mataupu

O a'u faʻamatalaga

  • Saini i totonu
  • Resitala

DSpace software copyright © 2002-2016  DuraSpace

Theme by   

Fa'afesootai mai le matou ofisa | Lafo mai manatu fa'aalia

Research Area:  Internet of Things

Abstract:

The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.

Author(s) Name:  Vikas Hassija; Vinay Chamola; Vikas Saxena; Divyansh Jain; Pranav Goyal; Biplab Sikdar

DOI:  10.1109/ACCESS.2019.2924045

Volume Information:  ( Volume: 7) Page(s): 82721 - 82743

V.HASSIJA1, V.CHAMOLA, V.SAXENA, D.JAIN, P.GOYAL & B.SIKDAR, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE, vol. 7, pp. 82721 - 82743, 2019.

M.Stoyanova, Y.Nikoloudakis, S. Panagiotakis, E.Pallis, & E. K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues," IEEE, pp. 1-38, 2020.

D.Sopori, T.Pawar, M.Patil, & R.Ravindran "Internet of Things: Security Threats," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 3, pp. 263-267, 2017.

A.Jain, B.Sharma, & P.Gupta "INTERNET OF THINGS: ARCHITECTURE, SECURITY GOALS, AND CHALLENGES- A SURVEY," International journal of innovative research in Sciense and Engineering , vol. 2, no. 4, pp. 154-163, 2016.

K.Krombholz, H.Hobel, M.Huber, & E. Weipp "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 2013.

J.Deogirikar, & A.Vidhate "Security Attacks inIoT: A Survey," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Palladam, India, 2017.

B.Yong, X.Liu, Q.Yu, L.Huang, & Q.Zhou "Malicious Web traffic detection for Internet of Things environments," Computers and Electrical Engineering, vol. 77, p. 260–272, 2019.

T.Nathezhtha, D.Sangeetha, V. Vaidehi "WC-PAD: Web Crawling based Phishing Attack Detection," in International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019.

S.A.Butt, & A.Ali, "IoT Smart Health Security Threats," in International Conference on Computational Science and Its Applications (ICCSA), Saint Petersburg, Russia, Russia, 2019.

F.Kausar, S.Alzaydi, S.Aljumah, & R.Alroba "Traffic Analysis Attack for Identifying Users’ Online Activities," IEEE IT Professional , vol. 21, no. 2, pp. 50-57, 2019.

"Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505 (2010). https://doi.org/10.1007/s10796-009-9210-z".

S.R.Taghanaki, K.Jamshidi, & A.Bohlooli "DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things," in IEEE, Mashhad, Iran, Iran, 2019.

N.Naher, Asaduzzaman, M.M Haque. "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC. In: Chakraborty M., Chakrabarti S., Balas V., Mandal J. (eds) Proceedings of International Ethical Hacking Conference Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore 2018.

C.Pu, "Spam DIS Attack Against Routing Protocol in the Internet of Things," in International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, USA, 2019.

Lo'ai A. Tawalbeh, T.F. Somani, "More secure Internet of Things using robust encryption algorithms against side channel attacks," in IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016.

A. Fox, "efficientgov," 21 May 2018. [Online]. Available: https://www.efficientgov.com/emergency-management/articles/cryptanalysis-attacks-protecting-government-data-encryption-gIzjjTqR78a0H0Cs/. [Accessed 5 May 2020].

N.NaherEmail, Md.Asaduzzaman, & Mokammel Haque "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC," in Proceedings of International Ethical Hacking Conference, Springer, Singapore, 2018.

R. Gour, "dzone," 30 Oct 2018. [Online]. Available: https://dzone.com/articles/top-10-uses-of-the-internet-of-things. [Accessed 5 May 2020].

T. Maddox, "techrepublic," 16 July 2018. [Online]. Available: https://www.techrepublic.com/article/smart-cities-the-smart-persons-guide/. [Accessed 5 May 2020].

G.Zhuo, Q.Jia, L.Guo, M.Li†, & Pan Li "Privacy-preserving Verifiable Data Aggregation and Analysis for Cloud-assisted Mobile Crowdsourcing," in The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 2016.

Zhang, J., Li, Q., Wang, X. et al. Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11, 778–792 (2018). https://doi.org/10.1007/s12083-017-0559-3

A.Alrawais, A.Alhothaily, C.Hu, X.Xingx, and X.Cheng, "An Attribute-Based Encryption Scheme to Secure Fog Communications," IEEE Access, vol. 5, pp. 9131 - 9138, May, 2017.

A.Alotaibi, A.Barnawi, M.Buhari, "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing," Journal of Information Security, vol. 8, pp. 203-222, 2017.

R.V. Kulkarni, G.K.Venayagamoorthy, "Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Networks," in Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14-19, 2009.

L.Xiao, C.Xie, T.Chen, H.Dai H. V.Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, vol. 4, pp. 2281 - 2291, 09 May 2016.

L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, `Proximity-based security techniques for mobile users in wireless networks,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.

G.Premsankar, M. Di Francesco, and T.Taleb, "Edge Computing for the Internet of Things: A Case Study," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1275 - 1284, April, 2018.

L. Rosencrance, " 6 significant issues that edge computing in IoT solves, 01 Nov 2018. [Online]. Available: https://internetofthingsagenda.techtarget.com/feature/6-significant-issues-that-edge-computing-in-IoT-solves?_ga=2.53786920.1250231981.1589957400-683346247.1588924221. [Accessed 20 May 2020].

N.Abbas, Y.Zhang, A.Taherkordi, and T.Skeie, "Mobile Edge Computing: A Survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450 - 465, 2018.

O. Novo, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," JOURNAL OF INTERNET OF THINGS CLASS FILES, vol. 14, no. 8, pp. 1-12, MARCH 2018.

P.LV, L.WANG, H.ZHU, W.DENG, and L.Gu, "An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains," IEEE Access , vol. 7, pp. 41309 - 41314, March 2019.

What are the security threats in IoT?

IoT devices are also particularly vulnerable to botnet attacks. Botnets are networks of devices that are used to run malicious bots and transfer malware. Botnets can infiltrate IoT networks to put ransomware, spyware, or other forms of malware on secure devices, compromising your financial and personal security.

What is IoT security architecture?

Many IoT attacks have used actuators, such as printers, as launch points into a business's network. An IoT security architecture is a blueprint that illustrates all components of the IoT infrastructure for all IoT projects and details how to secure each component.

What are the security solutions for the most common IoT security issues?

Here are top 10 IoT Security Solutions for the most common IoT security issues.
1 – Secure the IoT Network. ... .
2 – Authenticate the IoT Devices. ... .
3 – Use IoT Data Encryption. ... .
4 – Use IoT PKI Security Methods. ... .
6 – Use IoT API Security Methods. ... .
7 – Test the IoT Hardware. ... .
8 – Develop Secured IoT Apps..

What are the 3 major factors affecting IoT security?

There are three major factors affecting IoT security:.
Lack of IoT regulations..
Lack of embedded features..
Lack of manufacturer concern over data privacy..