A Review of Security and Privacy Concerns in the Internet of Things (IoT)

被引:12
|
作者
Aqeel, Muhammad [1 ]
Ali, Fahad [2 ]
Iqbal, Muhammad Waseem [1 ]
Rana, Toqir A. [3 ,4 ]
Arif, Muhammad [5 ]
Auwul, Md. Rabiul [6 ]
机构
[1] Super Univ, Dept Software Engn, Lahore, Pakistan
[2] Super Univ, Dept Informat Technol, Lahore, Pakistan
[3] Univ Lahore, Dept Comp Sci & IT, Lahore, Pakistan
[4] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
[5] Super Univ, Dept Comp Sci, Lahore, Pakistan
[6] Amer Int Univ Bangladesh, Fac Sci & Technol, Dept Math, Dhaka, Bangladesh
关键词
RPL-BASED INTERNET; WIRELESS NETWORKS; ATTACK DETECTION; SENSOR NETWORKS; JAMMING ATTACKS; TRUST; DEFENSE; SYSTEMS; SCHEME; CLOUD;
D O I
10.1155/2022/5724168
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications' connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code injections, and backdoor attacks. Traditional threats provide essential services such as authentication, authorization, and accountability. Authentication and authorization are the process of verifying that a subject is bound to an object. Traditional authentication and authorization mechanisms use three different factors to identity a subject to verify if the subject has the right capability to access the object. Further, it is defined that a computer virus is a type of malware. Malware includes computer viruses, worms, Trojan horses, spyware, and ransomware. There is a high probability that IoT systems can get infected with a more sophisticated form of malware and high-frequency electromagnetic waves. Purpose oriented with distinct nature IoT devices is developed to work in a constrained environment. So there is a dire need to address these security issues because relying on existing traditional techniques is not good. Manufacturers and researchers must think about resolving these security and privacy issues. Most importantly, this study identifies the knowledge and research gap in this area. The primary objective of this systematic literature review is to discuss the divergent types of threats that target IoT systems. Most importantly, the goal is to understand the mode of action of these threats and develop the recovery mechanism to cover the damage. In this study, more than 170 research articles are systematically studied to understand security and privacy issues. Further, security threats and attacks are categorized on a single platform and provide an analysis to explain how and to what extent they damage the targeted IoT systems. This review paper encapsulates IoT security threats and categorizes and analyses them by implementing a comparative study. Moreover, the research work concludes to expand advanced technologies, e.g., blockchain, machine learning, and artificial intelligence, to guarantee security, privacy, and IoT systems.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns
    Alshohoumi, Fatma
    Sarrab, Mohammed
    AlHamadani, Abdulla
    Al-Abri, Dawood
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (07) : 232 - 251
  • [32] Systematic review of existing IoT architectures security and privacy issues and concerns
    Alshohoumi, Fatma
    Sarrab, Mohammed
    AlHamadani, Abdulla
    Al-Abri, Dawood
    [J]. International Journal of Advanced Computer Science and Applications, 2019, 10 (07): : 232 - 251
  • [33] Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
    Hameed, Sufian
    Khan, Faraz Idris
    Hameed, Bilal
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [34] A Review on Biologically Inspired Approaches to Security for Internet of Things (IoT)
    Banu, Reshma
    Ahammed, G. F. Ali
    Fathima, Nasreen
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1062 - 1066
  • [35] Review of Security and Privacy for the Internet of Medical Things (IoMT) Resolving the protection concerns for the novel circular economy bioinformatics
    Hatzivasilis, George
    Soultatos, Othonas
    Ioannidis, Sotiris
    Verikoukis, Christos
    Demetriou, Giorgos
    Tsatsoulis, Christos Iraklis
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 457 - 464
  • [36] Privacy and the Internet of Things (IoT) Monitoring Solutions for Older Adults: A Review
    Alkhatib, Sami
    Waycott, Jenny
    Buchanan, George
    Bosua, Rachelle
    [J]. CONNECTING THE SYSTEM TO ENHANCE THE PRACTITIONER AND CONSUMER EXPERIENCE IN HEALTHCARE, 2018, 252 : 8 - 14
  • [37] Security, Privacy, and Trust on Internet of Things
    Kolias, Constantinos
    Meng, Weizhi
    Kambourakis, Georgios
    Chen, Jiageng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [38] SmartOrBAC Security and Privacy in the Internet of Things
    Bouij-Pasquier, Imane
    Abou El Kalam, Anas
    Ait Ouahman, Abdellah
    Ouabiba de Montfort, Mina
    [J]. 2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [39] Perceptions of Security and Privacy in Internet of Things
    Singh, Sarbjeet
    Kumar, Dilip
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 810 - 813
  • [40] Editorial: Security and Privacy in Internet of Things
    de Fuentes, Jose M.
    Gonzalez-Manzano, Lorena
    Lopez, Javier
    Peris-Lopez, Pedro
    Choo, Kim-Kwang Raymond
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 878 - 880