Securing the Internet of Things (IoT): A Security Taxonomy for IoT

被引:62
|
作者
Rizvi, Syed [1 ]
Pfeffer, Joseph, III [1 ]
Kurtz, Andrew [1 ]
Rizvi, Mohammad [2 ]
机构
[1] Penn State Univ, Dept Informat Sci & Technol, Altoona, PA 16601 USA
[2] PricewaterhouseCoopers PWC, Dallas, TX USA
关键词
IoT security; vulnerability; security threats;
D O I
10.1109/TrustCom/BigDataSE.2018.00034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet of Things (IoT), there is a vast number of connected devices that exist. These devices are collecting and transmitting great volumes of data from device to device, device to enterprise systems, and occasionally from device to humans. Due to the billions of connected devices, there is a great risk of identity and data theft, device manipulation, data falsification, server/network manipulation, and subsequent impact to application platforms. While the number of these interconnected devices continues to grow every day, so does the number of security threats and vulnerabilities posed to these devices. Security is one of the most paramount technological research problems that exist today for IoT. Security has many facets - security built within the device, security of data transmission, and data storage within the systems and its applications. There is an extensive amount of literature that exists on the subject with countless problems as well as proposed solutions; however, most of the existing work does not provide a holistic view of security and data privacy issues within the IoT. The primary goal of this research work is to advance the current state of the art in IoT research by identifying (a) the critical domains where IoT is heavily used, (b) the security requirements and challenges that IoT is currently facing, and (c) the existing security solutions that have been proposed or implemented with their limitations.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 50 条
  • [1] Internet of Things (IoT): Taxonomy of Security Attacks
    Nawir, Mukrimah
    Amir, Amiza
    Yaakob, Naimah
    Lynn, Ong Bi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326
  • [2] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [3] A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT)
    Alqassem, Israa
    Svetinovic, Davor
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 1244 - 1248
  • [4] Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
    Babar, Sachin
    Mahalle, Parikshit
    Stango, Antonietta
    Prasad, Neeli
    Prasad, Ramjee
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 420 - 429
  • [5] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    [J]. 2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [6] Internet of Things (IoT) Security
    Kulkarni, Shivaji
    Durg, Shrihari
    Iyer, Nalini
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 821 - 824
  • [7] A Changing Landscape: Securing the Internet of Things (IoT)
    Jha, Sanjay
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [8] Securing Internet of Things (IoT) with machine learning
    Zeadally, Sherali
    Tsikerdekis, Michail
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (01)
  • [9] Internet of Things (IoT) Security Platforms
    Waz, Ibrahim R.
    Sobh, Mohamed Ali
    Bahaa-Eldin, Ayman M.
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 500 - 507
  • [10] Security Requirements for Internet of Things (IoT)
    Jaiswal, Shruti
    Gupta, Daya
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 419 - 427