A Review of Security and Privacy Concerns in the Internet of Things (IoT)

被引:12
|
作者
Aqeel, Muhammad [1 ]
Ali, Fahad [2 ]
Iqbal, Muhammad Waseem [1 ]
Rana, Toqir A. [3 ,4 ]
Arif, Muhammad [5 ]
Auwul, Md. Rabiul [6 ]
机构
[1] Super Univ, Dept Software Engn, Lahore, Pakistan
[2] Super Univ, Dept Informat Technol, Lahore, Pakistan
[3] Univ Lahore, Dept Comp Sci & IT, Lahore, Pakistan
[4] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
[5] Super Univ, Dept Comp Sci, Lahore, Pakistan
[6] Amer Int Univ Bangladesh, Fac Sci & Technol, Dept Math, Dhaka, Bangladesh
关键词
RPL-BASED INTERNET; WIRELESS NETWORKS; ATTACK DETECTION; SENSOR NETWORKS; JAMMING ATTACKS; TRUST; DEFENSE; SYSTEMS; SCHEME; CLOUD;
D O I
10.1155/2022/5724168
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications' connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code injections, and backdoor attacks. Traditional threats provide essential services such as authentication, authorization, and accountability. Authentication and authorization are the process of verifying that a subject is bound to an object. Traditional authentication and authorization mechanisms use three different factors to identity a subject to verify if the subject has the right capability to access the object. Further, it is defined that a computer virus is a type of malware. Malware includes computer viruses, worms, Trojan horses, spyware, and ransomware. There is a high probability that IoT systems can get infected with a more sophisticated form of malware and high-frequency electromagnetic waves. Purpose oriented with distinct nature IoT devices is developed to work in a constrained environment. So there is a dire need to address these security issues because relying on existing traditional techniques is not good. Manufacturers and researchers must think about resolving these security and privacy issues. Most importantly, this study identifies the knowledge and research gap in this area. The primary objective of this systematic literature review is to discuss the divergent types of threats that target IoT systems. Most importantly, the goal is to understand the mode of action of these threats and develop the recovery mechanism to cover the damage. In this study, more than 170 research articles are systematically studied to understand security and privacy issues. Further, security threats and attacks are categorized on a single platform and provide an analysis to explain how and to what extent they damage the targeted IoT systems. This review paper encapsulates IoT security threats and categorizes and analyses them by implementing a comparative study. Moreover, the research work concludes to expand advanced technologies, e.g., blockchain, machine learning, and artificial intelligence, to guarantee security, privacy, and IoT systems.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Review on Security and Privacy Concerns in Internet of Things
    Kumar, Nishant
    Madhuri, J.
    ChanneGowda, Manjunath
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [2] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [3] Security and Privacy Issues in Internet of Things (IoT)
    Masood, Muhammad Sarmad
    Bajaj, Kamini
    Rajab, Mohamad Michael
    [J]. 2018 4TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [4] Security and privacy Aspects for Internet of Things (IoT)
    Bansal, Malti
    Nanda, Marshal
    Husain, Md Nazir
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 199 - 204
  • [5] A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
    Sudha, K. Swapna
    Jeyanthi, N.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 50 - 72
  • [6] SECURITY AND PRIVACY CONCERNS IN INTERNET-OF-THINGS - A SURVEY
    Chetna
    Mankiran
    Kataria, Ankita
    Kaur, Anmoldeep
    [J]. ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2020, 19 (06): : 435 - 442
  • [7] Beyond the Convenience of the Internet of Things: Security and Privacy Concerns
    Moganedi, Sophia
    Mtsweni, Jabu
    [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
  • [8] Privacy and Security Requirements Framework for the Internet of Things (IoT)
    Alqassem, Israa
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 739 - 741
  • [9] A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT)
    Alqassem, Israa
    Svetinovic, Davor
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 1244 - 1248
  • [10] Internet of Things (IoT) of Smart Homes: Privacy and Security
    Magara, Tinashe
    Zhou, Yousheng
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2024, 2024