A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

被引:645
|
作者
Hassija, Vikas [1 ]
Chamola, Vinay [2 ]
Saxena, Vikas [1 ]
Jain, Divyansh [1 ]
Goyal, Pranav [1 ]
Sikdar, Biplab [3 ]
机构
[1] Jaypee Inst Informat Technol, Dept CSE&IT, Noida 201309, India
[2] BITS, Dept EEE, Pilani 333031, Rajasthan, India
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); IoT security; blockchain; fog computing; edge computing; machine learning; IoT applications; distributed systems; COMPUTING PARADIGM; AGGREGATION SCHEME; INTERNET; PRIVACY; BLOCKCHAIN; EDGE; CLOUD; THINGS; MANAGEMENT; AUTHENTICATION;
D O I
10.1109/ACCESS.2019.2924045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an evergrowing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
引用
收藏
页码:82721 / 82743
页数:23
相关论文
共 50 条
  • [21] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [22] A Survey on IoT Architectures, Protocols, Security and Smart City based Applications
    Datta, Pant
    Sharma, Bhisham
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [23] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [24] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [25] A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
    Kim, Nam Yong
    Rathore, Shailendra
    Ryu, Jung Hyun
    Park, Jin Ho
    Park, Jong Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1361 - 1384
  • [26] A Review of the Weaponization of IoT: Security Threats and Countermeasures
    Kulbacki, Marek
    Chaczko, Zenon
    Barton, Sophie
    Wajs-Chaczko, Peter
    Nikodem, Jan
    Rozenblit, Jerzy W.
    Klempous, Ryszard
    Ito, Atsushi
    Kulbacki, Michal
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 279 - 284
  • [27] A Modeling Language for Security Threats of IoT Systems
    Beaulaton, Delphine
    Cristescu, Ioana
    Legay, Axel
    Quilbeuf, Jean
    FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, FMICS 2018, 2018, 11119 : 258 - 268
  • [28] Security Threats of Embedded Systems in IoT Environment
    Rajendran, Sreeja
    Lourde, R. Mary
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 745 - 754
  • [29] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [30] Security Issues in IoT: A Survey
    Hameed, Ali
    Alomary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,