Internet of Things Security and Privacy: A Systematic Investigation
Keywords:
IoT Security, IoT Protocols, Neural Networks, IOT Energy Management.Abstract
The Internet of Things (IoT) paradigm shift is one of the most remarkable phenomena of recent times.Many security issues are triggered when disparate IoT devices are combined with the traditional Internet. This is because conventional internet connection methods were never intended to accommodate IoT. As a result, there are now countless ways in which IoT-enabled equipment could be compromised. This assessment of the literature centred on the primary concerns regarding the safety of IoT. The adaption of machine learning techniques in IoT, as well as its layered architecture, protocols for communication, and energy-efficient data routing strategies, were all subjects of our research. In addition to discussing the current attacks, hazards, and state-of-the-art remedies, we lay out a road map for meeting the security needs of the Internet of Things. We also compile a table of IoT security issues and a map of published remedies. We conclude that an attacker can compromise an IoT device, infrastructure, or network based on the results of this study. As a result of the information gathered in this poll, researchers are more motivated than ever to create a foolproof intrusion detection system for the Internet of Things (IoT).
Downloads
References
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. J. I. c. s. Ayyash, and tutorials, "Internet of things: A survey on enabling technologies, protocols, and applications," vol. 17, no. 4, pp. 2347-2376, 2015.
J. Deogirikar and A. Vidhate, "Security attacks in IoT: A survey," in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017, pp. 32-37: IEEE.
Y. Yang, L. Wu, G. Yin, L. Li, and H. J. I. I. o. T. J. Zhao, "A survey on security and privacy issues in Internet-of-Things," vol. 4, no. 5, pp. 1250-1258, 2017.
M. Amadeo, C. Campolo, A. Iera, and A. Molinaro, "Information Centric Networking in IoT scenarios: The case of a smart home," in 2015 IEEE international conference on communications (ICC), 2015, pp. 648-653: IEEE.
M. Mohsin, Z. Anwar, G. Husari, E. Al-Shaer, and M. A. Rahman, "IoTSAT: A formal framework for security analysis of the internet of things (IoT)," in 2016 IEEE Conference on Communications and Network Security (CNS), 2016, pp. 180-188: IEEE.
S. R. Moosavi et al., "SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways," vol. 52, pp. 452-459, 2015.
F. Olivier, G. Carlos, and N. J. P. C. S. Florent, "New security architecture for IoT network," vol. 52, pp. 1028-1033, 2015.
M. Miettinen et al., "IoT Sentinel Demo: Automated device-type identification for security enforcement in IoT," in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, pp. 2511-2514: IEEE.
S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. J. I. s. j. Ferrari, "Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios," vol. 15, no. 2, pp. 1224-1234, 2015.
R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future internet: the internet of things architecture, possible applications and key challenges," in 2012 10th international conference on frontiers of information technology, 2012, pp. 257-260: IEEE.
M. Pavani, P. T. J. I. J. o. C. N. Rao, and I. Security, "Urban air pollution monitoring using wireless sensor networks: a comprehensive review," vol. 9, no. 3, pp. 439-449, 2017.
G. Mois, S. Folea, T. J. I. T. o. I. Sanislav, and Measurement, "Analysis of three IoT-based wireless sensors for environmental monitoring," vol. 66, no. 8, pp. 2056-2064, 2017.
G. Marques, R. J. I. j. o. e. r. Pitarma, and p. health, "An indoor monitoring system for ambient assisted living based on internet of things architecture," vol. 13, no. 11, p. 1152, 2016.
J. Granjal, E. Monteiro, J. S. J. I. C. S. Silva, and Tutorials, "Security for the internet of things: a survey of existing protocols and open research issues," vol. 17, no. 3, pp. 1294-1312, 2015.
M. Ambrosin et al., "On the feasibility of attribute-based encryption on internet of things devices," vol. 36, no. 6, pp. 25-35, 2016.
M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. J. a. p. a. Shah, "SIT: a lightweight encryption algorithm for secure internet of things," 2017.
A. A. Gendreau and M. Moorman, "Survey of intrusion detection systems towards an end to end secure internet of things," in 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), 2016, pp. 84-90: IEEE.
N. Vipin and M. A. Nizar, "Efficient on-line SPAM filtering for encrypted messages," in 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015, pp. 1-5: IEEE.
E. Hodo et al., "Threat analysis of IoT networks using artificial neural network intrusion detection system," in 2016 International Symposium on Networks, Computers and Communications (ISNCC), 2016, pp. 1-6: IEEE.
M. Nobakht, V. Sivaraman, and R. Boreli, "A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow," in 2016 11th International conference on availability, reliability and security (ARES), 2016, pp. 147-156: IEEE.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.