Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 6 , Issue 2 , PP: 67-78, 2022 | Cite this article as | XML | Html | PDF | Review Article

Security Challenges and Solutions in the Internet of Things

Ahmed Y. Abdullah 1 * , Ibrahim M. Elhenawy 2 , Ahmed Abdelmonem 3

  • 1 Faculty of computers and informatics, Zagazig university, Egypt - (eng.ahmedyousifgmai@gmail.com)
  • 2 Faculty of computers and informatics, Zagazig university, Egypt - (ielhenawy@zu.edu.eg)
  • 3 Faculty of computers and informatics, Zagazig university, Egypt - (aabdelmonem@zu.edu.eg)
  • Doi: https://doi.org/10.54216/JISIoT.060206

    Received: March 28, 2022 Accepted: July 08, 2022
    Abstract

    The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol

    Keywords :

    Internet of Things , Security , Privacy , IoT , Algorithms

    References

    [1]  L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and security: Challenges and solutions,” Applied Sciences, vol. 10, no. 12, p. 4102, 2020.

    [2]  A.  Hameed  and  A.  Alomary,  “Security  issues  in  IoT:  a  survey,”  in  2019 International  conference  on innovation and intelligence for informatics, computing, and technologies (3ICT) , 2019, pp. 1–5. 

    [3]  V.  Hassija,  V.  Chamola,  V.  Saxena,  D.  Jain,  P.  Goyal,  and  B.  Sikdar,  “A  survey  on  IoT  security: application areas, security threats, and solution architectures,”  IEEE Access, vol.  7, pp. 82721–82743, 2019.

    [4]  J. Mohanty, S. Mishra, S. Patra, B. Pati, and C. R. Panigrahi, “IoT security, challenges, and solutions: a review,”  Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2019, Volume 2, pp. 493–504, 2021.

    [5]  F. Al Shuhaimi, M. Jose, and A. V. Singh, “Software defined network as solution to overcome security challenges  in  IoT,”  in  2016  5th  International  Conference  on  Reliability,  Infocom  Technologies  and Optimization (Trends and Future Directions)(ICRITO), 2016, pp. 491–496.

    [6]  Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “IoT security: ongoing challenges and research opportunities,” in  2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230–234.

    [7]  H.  Lin  and  N.  W.  Bergmann,  “IoT  privacy  and  security  challenges  for  smart  home  environments,” Information, vol. 7, no. 3, p. 44, 2016.

    [8]  R. F. Ali, A. Muneer, P. D. D. Dominic, S. M. Taib, and E. A.  A. Ghaleb, “Internet of things (IoT) security challenges  and  solutions:  a  systematic  literature  review,”  in  Advances  in  Cyber  Security:  Third International Conference, ACeS 2021, Penang, Malaysia, August 24 –25, 2021, Revised Selected Papers 3, 2021, pp. 128–154.

    [9]  N. Almolhis, A. M. Alashjaee, S. Duraibi, F. Alqahtani, and A. N. Moussa, “The security issues in IoTcloud: a review,” in  2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), 2020, pp.191–196.

    [10]  M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah, “Security issues in the Internet of Things (IoT): A comprehensive study,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, 2017.

    [11]  Q. Jing, A. V Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wireless Networks, vol. 20, pp. 2481–2501, 2014.

    [12]  K. Sha, W. Wei, T. A. Yang, Z. Wang, and W. Shi, “On security challenges and open issues in Internet of Things,” Future generation computer systems, vol. 83, pp. 326–337, 2018.

    [13]  S. Rizvi, A. Kurtz, J. Pfeffer, and M. Rizvi, “Securing the internet of things (IoT): A security taxonomy for IoT,” in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th  IEEE  International  Conference  On  Big  Data  Science  And  Engineering (TrustCom/BigDataSE), 2018, pp. 163–168.

    [14]  M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,”  Future generation computer systems, vol. 82, pp. 395–411, 2018.

    [15]  H.  Touqeer,  S.  Zaman,  R.  Amin,  M.  Hussain,  F.  Al-Turjman,  and  M.  Bilal,  “Smart  home  security: challenges, issues and solutions at different IoT layers,”  The Journal of Supercomputing, vol. 77, no. 12, pp. 14053–14089, 2021.

    [16]  I. Ben Ida, A. Jemai, and A. Loukil, “A survey on security of IoT in the context of eHealth and clouds,” in 2016 11th International Design & Test Symposium (IDT), 2016, pp. 25–30.

    [17]  A.  Abdullah,  R.  Hamad,  M.  Abdulrahman,  H.  Moala,  and  S.  Elkhediri,  “CyberSecurity:  a  review  of internet of things (IoT) security issues, challenges and techniques,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1–6.

    [18]  C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, “IoT solution for smart cities’ pollution monitoring and the security challenges,” Sensors, vol. 19, no. 15, p. 3401, 2019.

    [19]  S. Shakya, “A perspective review of security issues in iot with cloud environment,”  Journal of IoT in Social, Mobile, Analytics, and Cloud, vol. 4, no. 2, pp. 84–93, 2022.

    [20]  J. Kuusijärvi,  R. Savola, P. Savolainen, and A. Evesti, “Mitigating IoT security threats with a trusted Network  element,”  in  2016  11th  International  Conference  for  Internet  Technology  and  Secured Transactions (ICITST), 2016, pp. 260–265.

    [21]  U.  Chatterjee  and  S.  Ray,  “Security  Issues  on  IoT  Communication  and  Evolving  Solutions,”  Soft Computing in Interdisciplinary Sciences, pp. 183–204, 2022.

    [22]  A. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, “A roadmap for security challenges in the Internet of Things,” Digital Communications and Networks, vol. 4, no. 2, pp. 118–137, 2018.

    [23]  M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet of things journal, vol. 5, no. 4, pp. 2483–2495, 2017.

    [24]  S. Anand and A. Sharma, “Assessment of security threats on IoT based applications,”  Materials today: proceedings, 2020.

    [25]  C.  Gonzalez-Amarillo,  C.  Cardenas-Garcia,  M.  Mendoza-Moreno,  G.  Ramirez-Gonzalez,  and  J.  C. Corrales, “Blockchain-iot sensor (Biots): A solution to iot-ecosystems security issues,”  Sensors, vol. 21, no. 13, p. 4388, 2021.

    [26]  J. Sengupta, S. Ruj, and S. Das Bit, “A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol. 149, p. 102481, 2020.

    [27]  B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,”  Internet of Things, vol. 11, p. 100227, 2020.

    Cite This Article As :
    Y., Ahmed. , M., Ibrahim. , Abdelmonem, Ahmed. Security Challenges and Solutions in the Internet of Things. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2022, pp. 67-78. DOI: https://doi.org/10.54216/JISIoT.060206
    Y., A. M., I. Abdelmonem, A. (2022). Security Challenges and Solutions in the Internet of Things. Journal of Intelligent Systems and Internet of Things, (), 67-78. DOI: https://doi.org/10.54216/JISIoT.060206
    Y., Ahmed. M., Ibrahim. Abdelmonem, Ahmed. Security Challenges and Solutions in the Internet of Things. Journal of Intelligent Systems and Internet of Things , no. (2022): 67-78. DOI: https://doi.org/10.54216/JISIoT.060206
    Y., A. , M., I. , Abdelmonem, A. (2022) . Security Challenges and Solutions in the Internet of Things. Journal of Intelligent Systems and Internet of Things , () , 67-78 . DOI: https://doi.org/10.54216/JISIoT.060206
    Y. A. , M. I. , Abdelmonem A. [2022]. Security Challenges and Solutions in the Internet of Things. Journal of Intelligent Systems and Internet of Things. (): 67-78. DOI: https://doi.org/10.54216/JISIoT.060206
    Y., A. M., I. Abdelmonem, A. "Security Challenges and Solutions in the Internet of Things," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 67-78, 2022. DOI: https://doi.org/10.54216/JISIoT.060206