A survey on security issues in IoT operating systems

被引:3
作者
Sun, Panjun [1 ]
Wan, Yi [1 ]
Wu, Zongda [1 ]
Fang, Zhaoxi [1 ]
机构
[1] Shaoxing Univ, Inst Artificial Intelligence, Dept Comp Sci & Engn, Shaoxing 312000, Zhejiang, Peoples R China
关键词
IoT; Operating systems; Defense security; Application scenario; Blockchain; ACCESS-CONTROL; INTRUSION DETECTION; INTERNET; THINGS; PRIVACY; PROTOCOL; COMMUNICATION; FRAMEWORK; DEVICES; SCHEME;
D O I
10.1016/j.jnca.2024.103976
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security issues of the core (operating systems) of the Internet of Things (IoT) are becoming increasingly urgent and prominent, this article conducts a systematic research and summary of the security of the current mainstream IoT operating system. Firstly, based on the architecture and applications functions of IoT devices, this article introduces the concept of operating system security, analyzes and studies the security vulnerabilities, key technologies, and attack and defense security mechanisms of operating systems. Secondly, this article investigates the application scenario used by IoT operating systems, such as smart homes, smart healthcare, smart industries, blockchain, and the Internet of Vehicles. Next, from the perspective of building a complete security system, this article investigates the security mechanisms, security frameworks, security kernels, platform integrity, and security testing of IoT operating systems. Finally, this article points out the security challenges and opportunities faced by IoT operating systems, summarizes the current research status, and puts forward corresponding suggestions.
引用
收藏
页数:28
相关论文
共 139 条
[1]   Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions [J].
Abbasi, Mahmoud ;
Plaza-Hernandez, Marta ;
Prieto, Javier ;
Corchado, Juan M. .
IEEE ACCESS, 2022, 10 :97197-97216
[2]   A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles [J].
Aftab, Muhammad Umar ;
Munir, Yasir ;
Oluwasanmi, Ariyo ;
Qin, Zhiguang ;
Aziz, Muhammad Haris ;
Zakria ;
Son, Ngo Tung ;
Iran, Van Dinh .
IEEE ACCESS, 2020, 8 :24196-24208
[3]   Developing a Security Testbed for Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5558-5573
[4]   A Proxy-Authorized Public Auditing Scheme for Cyber-Medical Systems Using AI-IoT [J].
Al-Turjman, Fadi ;
Deebak, B. D. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) :5371-5382
[5]   SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation [J].
Alasmary, Hisham ;
Anwar, Afsah ;
Abusnaina, Ahmed ;
Alabduljabbar, Abdulrahman ;
Abuhamad, Mohammed ;
Wang, An ;
Nyang, Daehun ;
Awad, Amro ;
Mohaisen, David .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2485-2496
[6]   A Survey on Resource Management and Security Issues in IoT Operating Systems [J].
AlDossary, Noura ;
AlQahtani, Sarah ;
AlUbaidan, Haya .
2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, :26-30
[7]   Ranking Security of IoT-Based Smart Home Consumer Devices [J].
Allifah, Naba M. ;
Zualkernan, Imran A. .
IEEE ACCESS, 2022, 10 :18352-18369
[8]   Cyber Secure Framework for Smart Agriculture: Robust and Tamper-Resistant Authentication Scheme for IoT Devices [J].
Alyahya, Saleh ;
Khan, Waseem Ullah ;
Ahmed, Salman ;
Marwat, Safdar Nawaz Khan ;
Habib, Shabana .
ELECTRONICS, 2022, 11 (06)
[9]   GoodPut, Collision Probability and Network Stability of Energy-Harvesting Cognitive-Radio IoT Networks [J].
Amini, Mohammad Reza ;
Baidas, Mohammed W. .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (04) :1283-1296
[10]   The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World [J].
Anton, Simon Daniel Duque ;
Fraunholz, Daniel ;
Krohmer, Daniel ;
Reti, Daniel ;
Schneider, Daniel ;
Schotten, Hans Dieter .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) :17525-17540