scholarly journals A Survey on IoT related Security Issues, Challenges And their Solutions

The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.

Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1141 ◽  
Author(s):  
Mohammed El-hajj ◽  
Ahmad Fadlallah ◽  
Maroun Chamoun ◽  
Ahmed Serhrouchni

The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.


Author(s):  
Xhafer Krasniqi

The Internet of Things that is defined as anything that can be accessible anytime and anywhere provides connectivity to different objects and sensors around us and which will enable the transfer of different data between these objects and devices. A thing in the Internet of Things can be any natural or man-made object that can be assigned an IP address with a capability to exchange date over a network. There is a huge number of applications of IoT to benefit users, such as health monitors, smart homes, connected cars etc. If everything around us is connected and information about these things that can contain sensitive information, e.g. health and other personal information, are collected then these networks become very important and must be able to provide a proper security and privacy. It is believed that by 2020 there will be over 50 billion things that could be connected to Internet. Internet of things are very much associated with M2M (machine to machine communication) that is identified as a technology that makes objects smart, like smart homes, smart utility meters etc. M2M actually is considered to be a subset of IoT and which is mainly used for difficult and dangerous tasks, e.g. nuclear plants, etc. The deployment of IoT has already started and is expected to transform the way we live. According to Gartner, a technology research company, the Internet of Things has just reached the deployment stage by early adopters and the full deployment is expected in over ten years. From an industry angle, this paper will examine the market and technical trends of Internet of Things, main applications that will be supported by this technology, key issues and challenges faced by the industry, standards activities around IoT and finally the implementation landscape.


2020 ◽  
Vol 25 (6) ◽  
pp. 737-745
Author(s):  
Subba Rao Peram ◽  
Premamayudu Bulla

To provide secure and reliable services using the internet of things (IoT) in the smart cities/villages is a challenging and complex issue. A high throughput and resilient services are required to process vast data generated by the smart city/villages that felicitates to run the applications of smart city. To provide security and privacy a scalable blockchain (BC) mechanism is a necessity to integrate the scalable ledger and transactions limit in the BC. In this paper, we investigated the available solutions to improve its scalability and efficiency. However, most of the algorithms are not providing the better solution to achieve scalability for the smart city data. Here, proposed and implemented a hybrid approach to improve the scalability and rate of transactions on BC using practical Byzantine fault tolerance and decentralized public key algorithms. The proposed Normachain is compares our results with the existing model. The results show that the transaction rate got improved by 6.43% and supervision results got improved by 17.78%.


2017 ◽  
pp. 260-277
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


2017 ◽  
pp. 189-204
Author(s):  
Sudhosil Panda

The Internet of Things (IoT) aims at connecting a large number of communication and information systems. With the further development of pervasive computing, these systems can be integrated into everyday objects, such as household devices and tools. When complex systems are interconnected, it is complicated to keep track of how secure a system or connection is and to distinguish which devices are connected within the IoT and which devices are not. As to the security, the IoT will be faced with more severe challenges. There are the following reasons: 1) the IoT extends the ‘internet' through the traditional internet, mobile network and sensor network and so on, 2) every ‘thing' will be connected to this ‘internet' and 3) these ‘things' will communicate with each other. Therefore, the new security and privacy problems will arise out of which authentication and access control are the most vital security issues that need to be taken care of. Therefore, we should pay more attention to the issues for confidentiality, authenticity and integrity of data in the IoT.


2020 ◽  
Vol 17 (6) ◽  
pp. 2552-2556
Author(s):  
Sarita Simaiya ◽  
Umesh Kumar Lilhore ◽  
Sanjeev Kumar Sharma ◽  
Kamali Gupta ◽  
Vidhu Baggan

A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transported publicly between a network to the next, therefore flowing information requires a great deal of further privacy consideration to guarantee IoT applications become reliable Internet of things technologies have been using various techniques of data protection of security and privacy. However, all such modern security systems have always been sufficient to ensure the Internet of things perceived safety. A Blockchain has become a revolutionary authoritative digital technology that really transforms commercial transactions absolutely. This is also a collaborative service that facilitates it uses a variety of features of cybersecurity. Blockchain technology seems to be the missing piece of the puzzle throughout the IoT to address problems of usability, anonymity, including security. Block chain’s crypto algorithms must enable transparency from customers very confidential. Throughout this research article, we introduce an analysis of IoT security concerns; blockchain gets addressed briefly as well as later addresses the security of IoT applications dependent on blockchain technologies.


2017 ◽  
Vol 76 ◽  
pp. 301-313 ◽  
Author(s):  
Cristian González García ◽  
Daniel Meana-Llorián ◽  
B. Cristina Pelayo G-Bustelo ◽  
Juan Manuel Cueva Lovelle ◽  
Nestor Garcia-Fernandez

Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


2014 ◽  
Vol 687-691 ◽  
pp. 2205-2209
Author(s):  
Xiu Rong Li ◽  
Shuang Zheng ◽  
Ya Li Liu

The Internet of things is the technology extension and expansion of computer, Internet and mobile communication network. We will strongly rely on the Internet of Things in the future. The Internet of Things provides more conveniences, but it also will face more threats. In this article, we describe architecture of the Internet of Things, the function of every layer and what components every layer need. Our emphasis is to analyze the threats for the security and privacy at different levels of architecture in the Internet of Things.


Author(s):  
Alan Fuad Jahwar ◽  
Subhi R. M. Zeebaree

The Internet of Things (IoT) is a paradigm shift that enables billions of devices to connect to the Internet. The IoT's diverse application domains, including smart cities, smart homes, and e-health, have created new challenges, chief among them security threats. To accommodate the current networking model, traditional security measures such as firewalls and Intrusion Detection Systems (IDS) must be modified. Additionally, the Internet of Things and Cloud Computing complement one another, frequently used interchangeably when discussing technical services and collaborating to provide a more comprehensive IoT service. In this review, we focus on recent Machine Learning (ML) and Deep Learning (DL) algorithms proposed in IoT security, which can be used to address various security issues. This paper systematically reviews the architecture of IoT applications, the security aspect of IoT, service models of cloud computing, and cloud deployment models. Finally, we discuss the latest ML and DL strategies for solving various security issues in IoT networks.


Sign in / Sign up

Export Citation Format

Share Document