Volume 6 , Issue 2 , PP: 67-78, 2022 | Cite this article as | XML | Html | PDF | Review Article
Ahmed Y. Abdullah 1 * , Ibrahim M. Elhenawy 2 , Ahmed Abdelmonem 3
Doi: https://doi.org/10.54216/JISIoT.060206
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol
Internet of Things , Security , Privacy , IoT , Algorithms
[1] L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,” Applied Sciences, vol. 10, no. 12, p. 4102, 2020.
[2] A. Hameed and A. Alomary, “Security issues in IoT: a survey,” in 2019 International conference on innovation and intelligence for informatics, computing, and technologies (3ICT) , 2019, pp. 1–5.
[3] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IoT security: application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019.
[4] J. Mohanty, S. Mishra, S. Patra, B. Pati, and C. R. Panigrahi, “IoT security, challenges, and solutions: a review,” Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2019, Volume 2, pp. 493–504, 2021.
[5] F. Al Shuhaimi, M. Jose, and A. V. Singh, “Software defined network as solution to overcome security challenges in IoT,” in 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016, pp. 491–496.
[6] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “IoT security: ongoing challenges and research opportunities,” in 2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230–234.
[7] H. Lin and N. W. Bergmann, “IoT privacy and security challenges for smart home environments,” Information, vol. 7, no. 3, p. 44, 2016.
[8] R. F. Ali, A. Muneer, P. D. D. Dominic, S. M. Taib, and E. A. A. Ghaleb, “Internet of things (IoT) security challenges and solutions: a systematic literature review,” in Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24 –25, 2021, Revised Selected Papers 3, 2021, pp. 128–154.
[9] N. Almolhis, A. M. Alashjaee, S. Duraibi, F. Alqahtani, and A. N. Moussa, “The security issues in IoTcloud: a review,” in 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), 2020, pp.191–196.
[10] M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah, “Security issues in the Internet of Things (IoT): A comprehensive study,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, 2017.
[11] Q. Jing, A. V Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wireless Networks, vol. 20, pp. 2481–2501, 2014.
[12] K. Sha, W. Wei, T. A. Yang, Z. Wang, and W. Shi, “On security challenges and open issues in Internet of Things,” Future generation computer systems, vol. 83, pp. 326–337, 2018.
[13] S. Rizvi, A. Kurtz, J. Pfeffer, and M. Rizvi, “Securing the internet of things (IoT): A security taxonomy for IoT,” in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, pp. 163–168.
[14] M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future generation computer systems, vol. 82, pp. 395–411, 2018.
[15] H. Touqeer, S. Zaman, R. Amin, M. Hussain, F. Al-Turjman, and M. Bilal, “Smart home security: challenges, issues and solutions at different IoT layers,” The Journal of Supercomputing, vol. 77, no. 12, pp. 14053–14089, 2021.
[16] I. Ben Ida, A. Jemai, and A. Loukil, “A survey on security of IoT in the context of eHealth and clouds,” in 2016 11th International Design & Test Symposium (IDT), 2016, pp. 25–30.
[17] A. Abdullah, R. Hamad, M. Abdulrahman, H. Moala, and S. Elkhediri, “CyberSecurity: a review of internet of things (IoT) security issues, challenges and techniques,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1–6.
[18] C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, “IoT solution for smart cities’ pollution monitoring and the security challenges,” Sensors, vol. 19, no. 15, p. 3401, 2019.
[19] S. Shakya, “A perspective review of security issues in iot with cloud environment,” Journal of IoT in Social, Mobile, Analytics, and Cloud, vol. 4, no. 2, pp. 84–93, 2022.
[20] J. Kuusijärvi, R. Savola, P. Savolainen, and A. Evesti, “Mitigating IoT security threats with a trusted Network element,” in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016, pp. 260–265.
[21] U. Chatterjee and S. Ray, “Security Issues on IoT Communication and Evolving Solutions,” Soft Computing in Interdisciplinary Sciences, pp. 183–204, 2022.
[22] A. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, “A roadmap for security challenges in the Internet of Things,” Digital Communications and Networks, vol. 4, no. 2, pp. 118–137, 2018.
[23] M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet of things journal, vol. 5, no. 4, pp. 2483–2495, 2017.
[24] S. Anand and A. Sharma, “Assessment of security threats on IoT based applications,” Materials today: proceedings, 2020.
[25] C. Gonzalez-Amarillo, C. Cardenas-Garcia, M. Mendoza-Moreno, G. Ramirez-Gonzalez, and J. C. Corrales, “Blockchain-iot sensor (Biots): A solution to iot-ecosystems security issues,” Sensors, vol. 21, no. 13, p. 4388, 2021.
[26] J. Sengupta, S. Ruj, and S. Das Bit, “A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol. 149, p. 102481, 2020.
[27] B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet of Things, vol. 11, p. 100227, 2020.