A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems

被引:16
作者
Adam, Mumin [1 ]
Hammoudeh, Mohammad [2 ]
Alrawashdeh, Rana [2 ]
Alsulaimy, Basil [2 ,3 ]
机构
[1] King Fahd Univ Petr & Minerals, Comp Engn Dept, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran 31261, Saudi Arabia
[3] Saudi Arabian Oil Co Saudi Aramco, Informat Protect Dept, Dhahran 31311, Saudi Arabia
关键词
Countermeasures; IDS; IoT architecture; IoT attacks; mitigation; privacy; security; security requirements; trust; LEARNING-BASED MODEL; ANOMALY DETECTION; INTERNET; ATTACKS; SERVICE; AUTHENTICATION; STANDARDS; DEVICES; ISSUES;
D O I
10.1109/ACCESS.2024.3382709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) emerged as a pervasive technology, facilitating the seamless interaction of devices, individuals, and services, enabling data exchange and task execution across various domains. While the impact of IoT is undeniably transformative, its extensive proliferation raised significant concerns surrounding security, privacy, and trust, which stand as critical barriers to the widespread adoption and advancement of IoT technology. This review article explores IoT security, privacy, and trust research using a 3-layer IoT architecture. After introducing the fundamental tenets of IoT security, privacy, and trust, it proceeds to examine the prevalent security requirements within IoT architectures and their associated challenges. Then, the survey investigates the recent trends in research dedicated to addressing security, privacy, and trust issues within IoT systems. Furthermore, this article reviews the latest advancements and methodologies designed to secure IoT systems against security breaches and protect the privacy of sensitive data. Finally, the survey outlines unresolved challenges within the IoT security landscape and potential solutions. By offering this consolidated insight, this article offers a bridge between foundational and advanced IoT security topics, providing researchers with an in-depth understanding of current IoT security, privacy, and trust challenges, as well as cutting-edge solutions tailored to address the security and trust-related obstacles faced by IoT applications. In addition, it provides the IoT community with the knowledge necessary to navigate the complex terrain of security, privacy, and trust in IoT systems.
引用
收藏
页码:57128 / 57149
页数:22
相关论文
共 124 条
[1]  
Abdel-Halim Islam Tharwat, 2022, 2022 4th Novel Intelligent and Leading Emerging Sciences Conference (NILES), P39, DOI 10.1109/NILES56402.2022.9942373
[2]   Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions [J].
Abdelmaboud, Abdelzahir ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Abaker, Mohammed ;
Eisa, Taiseer Abdalla Elfadil ;
Albasheer, Hashim ;
Ghorashi, Sara Abdelwahab ;
Karim, Faten Khalid .
ELECTRONICS, 2022, 11 (04)
[3]   Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems [J].
Abdi, Adam Ibrahim ;
Eassa, Fathy Elbouraey ;
Jambi, Kamal ;
Almarhabi, Khalid ;
Khemakhem, Maher ;
Basuhail, Abdullah ;
Yamin, Mohammad .
ELECTRONICS, 2022, 11 (05)
[4]   IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System [J].
Ahsan, Talha ;
Khan, Farrukh Zeeshan ;
Iqbal, Zeshan ;
Ahmed, Muneer ;
Alroobaea, Roobaea ;
Baqasah, Abdullah M. ;
Ali, Ihsan ;
Raza, Muhammad Ahsan .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[5]  
Alam T, 2020, Arxiv, DOI [arXiv:1902.09779, DOI 10.2139/SSRN.3639000]
[6]  
Alferidah DK, 2020, INT J COMPUT SCI NET, V20, P263
[7]   Security and Privacy Requirements for the Internet of Things: A Survey [J].
Alhirabi, Nada ;
Rana, Omer ;
Perera, Charith .
ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01)
[8]   Middleware and communication technologies for structural health monitoring of critical infrastructures: A survey [J].
Alonso, Luis ;
Barbaran, Javier ;
Chen, Jaime ;
Diaz, Manuel ;
Llopis, Luis ;
Rubio, Bartolome .
COMPUTER STANDARDS & INTERFACES, 2018, 56 :83-100
[9]   A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer .
ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 :533-543
[10]   Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review [J].
Alsoufi, Muaadh A. ;
Razak, Shukor ;
Siraj, Maheyzah Md ;
Nafea, Ibtehal ;
Ghaleb, Fuad A. ;
Saeed, Faisal ;
Nasser, Maged .
APPLIED SCIENCES-BASEL, 2021, 11 (18)