Security Threats and Research Challenges of IoT - A Review

Authors

  • AKM Bahalul Haque Department of Electrical and Compute Engineering, North South University, Bangladesh
  • Sonia Tasmin Department of Electrical and Computer Engineering, North South University, Bangladesh

DOI:

https://doi.org/10.38032/jea.2020.04.008

Keywords:

IoT, Security, privacy, Attacks, Vulnerability, Threats, Challenges

Abstract

Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of understanding the widespread adoption. Security issues are very crucial for any technical infrastructure. Since IoT comprises heterogeneous devices, its security issues are diverse too. Various security attacks can be responsible for compromising confidentiality, integrity, and availability. In this paper, at first, the IoT architecture is described briefly. After that, the components of IoT are explained with perspective to various IoT based applications and services. Finally, various security issues, including recommended solutions, are elaborately described and the potential research challenges and future research directions.

References

Bartolomeo, M., 2014. Internet of things: Science fiction or business fact. A Harvard Business Review Analytic Services Report, Tech. Rep.

Vermesan, O. and Friess, P. eds., 2013. Internet of things: converging technologies for smart environments and integrated ecosystems. River publishers.

Santucci, G., 2010. The internet of things: Between the revolution of the internet and the metamorphosis of objects. Vision and Challenges for Realising the Internet of Things, pp.11-24.

Mattern, F. and Floerkemeier, C., 2010. From the Internet of Computers to the Internet of Things. In From active data management to event-based systems and more (pp. 242-259). Springer, Berlin, Heidelberg.

Kwon, D., Hodkiewicz, M.R., Fan, J., Shibutani, T. and Pecht, M.G., 2016. IoT-based prognostics and systems health management for industrial applications. IEEE Access, 4, pp.3659-3670.

Erlich, Y., 2015. A vision for ubiquitous sequencing. Genome research, 25(10), pp.1411-1416.

Wigmore, I., 2014. Internet of things (iot). TechTarget.

WALDEN, I. and Noto La Diego, G., 2016. Contracting for the Internet of Things: Looking into the NEST. European Journal of Law and Technology.

Kumar, N.M. and Mallick, P.K., 2018. The Internet of Things: Insights into the building blocks, component interactions, and architecture layers. Procedia computer science, 132, pp.109-117.

Catarinucci, L., De Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M.L. and Tarricone, L., 2015. An IoT-aware architecture for smart healthcare systems. IEEE internet of things journal, 2(6), pp.515-526.

Srivastava, G., Parizi, R.M., Dehghantanha, A. and Choo, K.K.R., 2019, November. Data sharing and privacy for patient iot devices using blockchain. In International Conference on Smart City and Informatization (pp. 334-348). Springer, Singapore.

Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R.M. and Srivastava, G., 2019. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet of things, p.100111.

Behera, T.M., Mohapatra, S.K., Samal, U.C., Khan, M.S., Daneshmand, M. and Gandomi, A.H., 2019. Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet of Things Journal, 6(3), pp.5132-5139.

He, W., Yan, G. and Da Xu, L., 2014. Developing vehicular data cloud services in the IoT environment. IEEE transactions on industrial informatics, 10(2), pp.1587-1595.

Paranjothi, A., Khan, M.S., Zeadally, S., Pawar, A. and Hicks, D., 2019. GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet of Things, 7, p.100071.

Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S. and Sheng, Q.Z., 2016. IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal, 4(1), pp.1-20.

Qi, J., Yang, P., Min, G., Amft, O., Dong, F. and Xu, L., 2017. Advanced internet of things for personalised healthcare systems: A survey. Pervasive and Mobile Computing, 41, pp.132-149.

Santos, J., Rodrigues, J.J., Silva, B.M., Casal, J., Saleem, K. and Denisov, V., 2016. An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. Journal of Network and Computer Applications, 71, pp.194-204.

Chen, J., Touati, C. and Zhu, Q., 2019. Optimal secure two-layer IoT network design. IEEE Transactions on Control of Network Systems, 7(1), pp.398-409.

Mahalle, P., Babar, S., Prasad, N.R. and Prasad, R., 2010, July. Identity management framework towards internet of things (IoT): Roadmap and key challenges. In International Conference on Network Security and Applications (pp. 430-439). Springer, Berlin, Heidelberg.

Canedo, J. and Skjellum, A., 2016, December. Using machine learning to secure IoT systems. In 2016 14th annual conference on privacy, security and trust (PST) (pp. 219-222). IEEE.

Grassi, P.A., Garcia, M.E. and Fenton, J.L., 2017. DRAFT NIST Special Publication 800-63-3 Digital Identity Guidelines. National Institute of Standards and Technology, Los Altos, CA.

HaddadPajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M. and Karimipour, H., 2019. A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things, p.100129.

Koshizuka, N. and Sakamura, K., 2010. Ubiquitous ID: standards for ubiquitous computing and the internet of things. IEEE Pervasive Computing, 9(4), pp.98-101.

Taj-Eddin, I.A., Abou El-Seoud, M.S. and Elsofany, H., 2017, September. A Proposed Lightweight Cloud Security Framework to Secure Communications Between Internet of Things Devices. In International Conference on Interactive Collaborative Learning (pp. 517-525). Springer, Cham.

Montenegro, G., Kushalnagar, N., Hui, J. and Culler, D., 2007. Transmission of IPv6 packets over IEEE 802.15. 4 networks. Internet proposed standard RFC, 4944, p.130.

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. and Ayyash, M., 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE communications surveys & tutorials, 17(4), pp.2347-2376.

Rushden, U., 2012. Belkin brings your home to your fingertips with WeMo Home Automation System. Press Room Belkin.

Want, R., 2006. An introduction to RFID technology. IEEE pervasive computing, 5(1), pp.25-33.

Want, R., 2011. Near field communication. IEEE Pervasive Computing, 10(3), pp.4-7.

Kshetrimayum, R.S., 2009. An introduction to UWB communication systems. Ieee Potentials, 28(2), pp.9-13.

Ferro, E. and Potorti, F., 2005. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wireless Communications, 12(1), pp.12-26.

P. McDermott-Wells, "What is Bluetooth?" IEEE Potentials, 23(5), pp. 33–35, Jan. 2005.

Khajenasiri, I., Estebsari, A., Verhelst, M. and Gielen, G., 2017. A review on Internet of Things solutions for intelligent energy control in buildings for smart city applications. Energy Procedia, 111, pp.770-779.

IEEE Standards Association, 2011. IEEE Std 802.15. 4-2011, IEEE standard for local and metropolitan area networks—part 15.4: Low-rate wireless personal area networks (LR-WPANs).

Crosby, G.V. and Vafa, F., 2013, October. Wireless sensor networks and LTE-A network convergence. In 38th Annual IEEE conference on local computer networks (pp. 731-734). IEEE.

Ghosh, A., Ratasuk, R., Mondal, B., Mangalvedhe, N. and Thomas, T., 2010. LTE-advanced: next-generation wireless broadband technology. IEEE wireless communications, 17(3), pp.10-22.

Dunkels, A., Gronvall, B. and Voigt, T., 2004, November. Contiki-a lightweight and flexible operating system for tiny networked sensors. In 29th annual IEEE international conference on local computer networks (pp. 455-462). IEEE.

Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E. and Culler, D., 2005. TinyOS: An operating system for sensor networks. In Ambient intelligence (pp. 115-148). Springer, Berlin, Heidelberg.

[Cao, Q., Abdelzaher, T., Stankovic, J. and He, T., 2008, April. The liteos operating system: Towards unix-like abstractions for wireless sensor networks. In 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008) (pp. 233-244). Ieee.

Baccelli, E., Hahm, O., Günes, M., Wählisch, M. and Schmidt, T.C., 2013, April. RIOT OS: Towards an OS for the Internet of Things. In 2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 79-80). IEEE.

Open Auto Alliance. Available at: http://www. openautoalliance.net/. Accessed on Oct. 20, 2014.

Xiao, L., Greenstein, L.J., Mandayam, N.B. and Trappe, W., 2009. Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), pp.492-503.

Xu, W., Trappe, W., Zhang, Y. and Wood, T., 2005, May. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46-57).

Noubir, G. and Lin, G., 2003. Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), pp.29-30.

Chen, Y., Trappe, W. and Martin, R.P., 2007, June. Detecting and localizing wireless spoofing attacks. In 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 193-202). IEEE.

Chae, S.H., Choi, W., Lee, J.H. and Quek, T.Q., 2014. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), pp.1617-1628.

Hong, Y.W.P., Lan, P.C. and Kuo, C.C.J., 2013. Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Processing Magazine, 30(5), pp.29-40.

OWASP, T. I. V. (2016). Available at: https://www. owasp. org/index. php.

Zhang, K., Liang, X., Lu, R. and Shen, X., 2014. Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5), pp.372-383.

Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H. and Zhao, B.Y., 2012. Social turing tests: Crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856.

Riaz, R., Kim, K.H. and Ahmed, H.F., 2009, March. Security analysis survey and framework design for ip connected lowpans. In 2009 International Symposium on Autonomous Decentralized Systems (pp. 1-6). IEEE.

Dvir, A. and Buttyan, L., 2011, October. VeRA-version number and rank authentication in RPL. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems (pp. 709-714). IEEE.

Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H. and Wehrle, K., 2013, April. 6LoWPAN fragmentation attacks and mitigation mechanisms. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 55-66).

Kim, H., 2008, August. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In 2008 International Conference on Convergence and Hybrid Information Technology (pp. 796-801). IEEE.

Weekly, K. and Pister, K., 2012, October. Evaluating sinkhole defense techniques in RPL networks. In 2012 20th IEEE International Conference on Network Protocols (ICNP) (pp. 1-6). IEEE.

Ahmed, F. and Ko, Y.B., 2016. Mitigation of black hole attacks in routing protocol for low power and lossy networks. Security and Communication Networks, 9(18), pp.5143-5154.

Wazid, M., Das, A.K., Kumari, S. and Khan, M.K., 2016. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Security and Communication Networks, 9(17), pp.4596-4614.

Peretti, G., Lakkundi, V. and Zorzi, M., 2015, January. BlinkToSCoAP: An end-to-end security framework for the Internet of Things. In 2015 7th International Conference on Communication Systems and Networks (COMSNETS) (pp. 1-6). IEEE.

Esposito, C., Castiglione, A., Tudorica, C.A. and Pop, F., 2017. Security and privacy for cloud-based data management in the health network service chain: a microservice approach. IEEE Communications Magazine, 55(9), pp.102-108.

Henze, M., Wolters, B., Matzutt, R., Zimmermann, T. and Wehrle, K., 2017, August. Distributed configuration, authorization and management in the cloud-based internet of things. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 185-192). IEEE.

Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R. and Spirito, M.A., 2012, July. The virtus middleware: An xmpp based architecture for secure iot communications. In 2012 21st International Conference on Computer Communications and Networks (ICCCN) (pp. 1-6). IEEE.

Liu, C.H., Yang, B. and Liu, T., 2014. Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Networks, 18, pp.85-101.

Brachmann, M., Keoh, S.L., Morchon, O.G. and Kumar, S.S., 2012, July. End-to-end transport security in the IP-based internet of things. In 2012 21st International Conference on Computer Communications and Networks (ICCCN) (pp. 1-5). IEEE.

Granjal, J., Monteiro, E. and Silva, J.S., 2013, June. Application-layer security for the WoT: Extending CoAP to support end-to-end message security for Internet-integrated sensing applications. In International Conference on Wired/Wireless Internet Communication (pp. 140-153). Springer, Berlin, Heidelberg.

Sethi, M., Arkko, J. and Keränen, A., 2012, October. End-to-end security for sleepy smart object networks. In 37th Annual IEEE Conference on Local Computer Networks-Workshops (pp. 964-972). IEEE.

Xu, W., Trappe, W., Zhang, Y. and Wood, T., 2005, May. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46-57).

Noubir, G. and Lin, G., 2003. Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), pp.29-30.

Xu, W., Wood, T., Trappe, W. and Zhang, Y., 2004, October. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop on Wireless security (pp. 80-89).

Chae, S.H., Choi, W., Lee, J.H. and Quek, T.Q., 2014. Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), pp.1617-1628.

Hong, Y.W.P., Lan, P.C. and Kuo, C.C.J., 2013. Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Processing Magazine, 30(5), pp.29-40.

Pecorella, T., Brilli, L. and Mucchi, L., 2016. The role of physical layer security in IoT: A novel perspective. Information, 7(3), p.49.

Xiao, L., Greenstein, L.J., Mandayam, N.B. and Trappe, W., 2009. Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), pp.492-503.

Chen, Y., Trappe, W. and Martin, R.P., 2007, June. Detecting and localizing wireless spoofing attacks. In 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 193-202). IEEE.

Demirbas, M. and Song, Y., 2006, June. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06) (pp. 5-pp). ieee.

Bhattasali, T. and Chaki, R., 2011, July. A survey of recent intrusion detection systems for wireless sensor network. In International conference on network security and applications (pp. 268-280). Springer, Berlin, Heidelberg.

Riaz, R., Kim, K.H. and Ahmed, H.F., 2009, March. Security analysis survey and framework design for ip connected lowpans. In 2009 International Symposium on Autonomous Decentralized Systems (pp. 1-6). IEEE.

Harkanson, R. and Kim, Y., 2017, April. Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (pp. 1-7).

Eastlake, D., & Jones, P. 2001. US secure hash algorithm 1 (SHA1).

Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411.

Rivest, R.L., 1978. Shamir, a. and Adelman. L." On Digital Signatures and Public Key.

Dvir, A. and Buttyan, L., 2011, October. VeRA-version number and rank authentication in RPL. In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems (pp. 709-714). IEEE.

Li, F. and Xiong, P., 2013. Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sensors Journal, 13(10), pp.3677-3684.

Zhou, J., Cao, Z., Dong, X. and Vasilakos, A.V., 2017. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), pp.26-33.

Bohli, J.M., Skarmeta, A., Moreno, M.V., García, D. and Langendörfer, P., 2015, April. SMARTIE project: Secure IoT data management for smart cities. In 2015 International Conference on Recent Advances in Internet of Things (RIoT) (pp. 1-6). IEEE.

Pöhls, H.C., Angelakis, V., Suppan, S., Fischer, K., Oikonomou, G., Tragos, E.Z., Rodriguez, R.D. and Mouroutis, T., 2014, April. RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects. In 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) (pp. 122-127). IEEE.

Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411.

Pérez, S., Martínez, J.A., Skarmeta, A.F., Mateus, M., Almeida, B. and Maló, P., 2016, December. ARMOUR: Large-scale experiments for IoT security & trust. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 553-558). IEEE.

Granjal, J., Monteiro, E. and Silva, J.S., 2013, June. Application-layer security for the WoT: Extending CoAP to support end-to-end message security for Internet-integrated sensing applications. In International Conference on Wired/Wireless Internet Communication (pp. 140-153). Springer, Berlin, Heidelberg.

Brachmann, M., Keoh, S.L., Morchon, O.G. and Kumar, S.S., 2012, July. End-to-end transport security in the IP-based internet of things. In 2012 21st International Conference on Computer Communications and Networks (ICCCN) (pp. 1-5). IEEE.

Sethi, M., Arkko, J. and Keränen, A., 2012, October. End-to-end security for sleepy smart object networks. In 37th Annual IEEE Conference on Local Computer Networks-Workshops (pp. 964-972). IEEE.

Sethi, M., Arkko, J. and Keränen, A., 2012, October. End-to-end security for sleepy smart object networks. In 37th Annual IEEE Conference on Local Computer Networks-Workshops (pp. 964-972). IEEE.

Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R. and Spirito, M.A., 2012, July. The virtus middleware: An xmpp based architecture for secure iot communications. In 2012 21st International Conference on Computer Communications and Networks (ICCCN) (pp. 1-6). IEEE.

Hall, B. and Henningsen, D.D., 2008. Social facilitation and human–computer interaction. Computers in human behavior, 24(6), pp.2965-2971.

Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411.

Miller, D., 2018. Blockchain and the internet of things in the industrial sector. IT professional, 20(3), pp.15-18.

Dorri, A., Kanhere, S.S., Jurdak, R. and Gauravaram, P., 2017, March. Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618-623). IEEE.

Fremantle, P., Aziz, B. and Kirkham, T., 2017, April. Enhancing IoT security and privacy with distributed ledgers-a position paper. In IoTBDS 2017: 2nd Interantional Conference on Internet of Things, Big Data and Security (pp. 344-349). SCITEPRESS–Science and Technology Publications.

Oracevic, A., Dilek, S. and Ozdemir, S., 2017, May. Security in internet of things: A survey. In 2017 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-6). IEEE.

Oh, S.R. and Kim, Y.G., 2017, February. Security requirements analysis for the IoT. In 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1-6). IEEE.

Ahemd, M.M., Shah, M.A. and Wahid, A., 2017, April. IoT security: A layered approach for attacks & defenses. In 2017 international conference on Communication Technologies (ComTech) (pp. 104-110). IEEE.

Ouaddah, A., Abou El Kalam, A. and Ouahman, A.A., 2017, March. Harnessing the power of blockchain technology to solve IoT security & privacy issues. In ICC (pp. 7-1).

Salman, O., Elhajj, I., Chehab, A. and Kayssi, A., 2017, May. Software defined iot security framework. In 2017 Fourth International Conference on Software Defined Systems (SDS) (pp. 75-80). IEEE.

Miraz, M.H. and Ali, M., 2018, August. Blockchain enabled enhanced IoT ecosystem security. In International Conference for Emerging Technologies in Computing (pp. 38-46). Springer, Cham.

Román-Castro, R., López, J. and Gritzalis, S., 2018. Evolution and trends in iot security. Computer, 51(7), pp.16-25.

Vorakulpipat, C., Rattanalerdnusorn, E., Thaenkaew, P. and Hai, H.D., 2018, February. Recent challenges, trends, and concerns related to IoT security: An evolutionary study. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 405-410). IEEE.

Roy, S., Ashaduzzaman, M., Hassan, M. and Chowdhury, A.R., 2018, December. Blockchain for IoT security and management: current prospects, challenges and future directions. In 2018 5th International Conference on Networking, Systems and Security (NSysS) (pp. 1-9). IEEE.

Xiao, L., Wan, X., Lu, X., Zhang, Y. and Wu, D., 2018. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), pp.41-49.

Stergiou, C., Psannis, K.E., Gupta, B.B. and Ishibashi, Y., 2018. Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems, 19, pp.174-184.

Sollins, K.R., 2019. IoT big data security and privacy versus innovation. IEEE Internet of Things Journal, 6(2), pp.1628-1635.

Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C. and Faruki, P., 2019. Network intrusion detection for IoT security based on learning techniques. IEEE Communications Surveys & Tutorials, 21(3), pp.2671-2701.

Nizzi, F., Pecorella, T., Esposito, F., Pierucci, L. and Fantacci, R., 2019. IoT security via address shuffling: the easy way. IEEE Internet of Things Journal, 6(2), pp.3764-3774.

Alraja, M.N., Farooque, M.M.J. and Khashab, B., 2019. The effect of security, privacy, familiarity, and trust on users’ attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access, 7, pp.111341-111354.

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P. and Sikdar, B., 2019. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access, 7, pp.82721-82743.

Rahman, A., Nasir, M.K., Rahman, Z., Mosavi, A., Shahab, S. and Minaei-Bidgoli, B., 2020. Distblockbuilding: A distributed blockchain-based sdn-iot network for smart building management. IEEE Access, 8, pp.140008-140018.

Mohanta, B. K., Jena, D., Ramasubbareddy, S., Daneshmand, M., & Gandomi, A. H. 2020. Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet of Things Journal. doi: 10.1109/JIOT.2020.3008906

Dedeoglu, V., Jurdak, R., Dorri, A., Lunardi, R.C., Michelin, R.A., Zorzo, A.F. and Kanhere, S.S., 2020. Blockchain technologies for iot. In Advanced Applications of Blockchain Technology (pp. 55-89). Springer, Singapore.

Hussain, F., Hussain, R., Hassan, S.A. and Hossain, E., 2020. Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials.

Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M.H. and Lim, J., 2020. Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey. IEEE Access, 8, pp.167123-167163.

Mohanty, S.N., Ramya, K.C., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K. and Khanna, A., 2020. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, pp.1027-1037.

Tewari, A. and Gupta, B.B., 2020. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems, 108, pp.909-920.

Islam, M.N. and Kundu, S., 2020. IoT security, privacy and trust in home-sharing economy via blockchain. In Blockchain Cybersecurity, Trust and Privacy (pp. 33-50). Springer, Cham.

Barbosa, P., Brito, A. and Almeida, H., 2016. A technique to provide differential privacy for appliance usage in smart metering. Information Sciences, 370, pp.355-367.

Yin, C., Zhang, S., Xi, J. and Wang, J., 2017. An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation: Practice and Experience, 29(7), p.e3902.

Rodríguez, C.R.G., 2016, August. Using differential privacy for the Internet of Things. In IFIP International Summer School on Privacy and Identity Management (pp. 201-211). Springer, Cham.

Ruiz-Garcia, L. and Lunadei, L., 2011. The role of RFID in agriculture: Applications, limitations and challenges. Computers and Electronics in Agriculture, 79(1), pp.42-50.

Tian, F., 2016, June. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In 2016 13th international conference on service systems and service management (ICSSSM) (pp. 1-6). IEEE.

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), pp.1125-1142.

Biswas, K. and Muthukkumarasamy, V., 2016, December. Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392-1393). IEEE.

Downloads

Published

22-12-2020
  • Abstract view1227

How to Cite

Haque, A. B. ., & Sonia Tasmin. (2020). Security Threats and Research Challenges of IoT - A Review. Journal of Engineering Advancements, 1(04), 170–182. https://doi.org/10.38032/jea.2020.04.008
صندلی اداری سرور مجازی ایران Decentralized Exchange

Issue

Section

Review Articles
فروشگاه اینترنتی صندلی اداری