Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications

被引:1
作者
Kumari, N. Sharmila [1 ]
Vimala, H. S. [1 ]
Pruthvi, C. N. [2 ]
Shreyas, J. [3 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya Coll Engn UVCE, IIT Model Coll, Dept Comp Sci & Engn, Bengaluru 560001, India
[2] Dayananda Sagar Coll Engn, Dept Comp Sci & Engn, Bengaluru 560078, India
[3] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Informat Technol, Manipal 576104, Karnataka, India
关键词
Internet of Things; Security; Surveys; Protocols; Performance evaluation; Data privacy; Threat modeling; Systematic literature review; Smart healthcare; Smart agriculture; Risk management; Attacks; application layer; IoT; security; protocols; INDUSTRIAL INTERNET; INTRUSION DETECTION; THINGS SECURITY; ACCESS-CONTROL; SMART HOME; PRIVACY; NETWORKS; SCHEME; FRAMEWORK; REQUIREMENTS;
D O I
10.1109/ACCESS.2024.3462170
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: The growing number of linked devices, the limitations of some IoT devices, worries about data privacy, risks to physical safety, and the ever-changing threats all highlight why it's crucial to have strong security measures in the IoT application layer. We need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks. Objective: The study's goal is to examine the research on IoT application layer security with attacks, applications and protocols and demands further focus in current and future research areas. Method: To find the relevant literature, a systematic investigation was done, in 221 articles, 123 articles are selected as a most relevant articles and classified as security in IoT applications and protocols. Result: This paper mainly concentrated on security in IoT application layer, the articles are grouped as attacks, applications and protocols. Based on IoT applications, smart home (15.3%), smart health care (12.2%), smart home (13.3%), smart agriculture (17.3%), smart vehicles (16.3%), smart grid(15.3%) and Industrial IoT (10.2%) represents the majority of articles. This survey further analyses the performance metrics, parameters and performance evaluation of the existing literature. Conclusion: The results confirm that we need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks.
引用
收藏
页码:186957 / 187014
页数:58
相关论文
共 220 条
[81]   Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers [J].
Haider, Sami Ahmed ;
Adil, Muhammad Naeem ;
Zhao, MinJian .
COMPUTER COMMUNICATIONS, 2020, 154 :119-128
[82]   Detection and Characterization of DDoS Attacks Using Time-Based Features [J].
Halladay, James ;
Cullen, Drake ;
Briner, Nathan ;
Warren, Jackson ;
Fye, Karson ;
Basnet, Ram ;
Bergen, Jeremy ;
Doleck, Tenzin .
IEEE ACCESS, 2022, 10 :49794-49807
[83]   Survey on smart homes: Vulnerabilities, risks, and countermeasures [J].
Hammi, Badis ;
Zeadally, Sherali ;
Khatoun, Rida ;
Nebhen, Jamel .
COMPUTERS & SECURITY, 2022, 117
[84]   Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations [J].
Hasan, Mohammad Kamrul ;
Habib, A. K. M. Ahasan ;
Shukur, Zarina ;
Ibrahim, Fazil ;
Islam, Shayla ;
Razzaque, Md Abdur .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 209
[85]   A Novel Image Steganography Method for Industrial Internet of Things Security [J].
Hassaballah, M. ;
Hameed, Mohamed Abdel ;
Awad, Ali Ismail ;
Muhammad, Khan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) :7743-7751
[86]  
Hassan B., 2022, Wireless Commun. Mobile Comput., P1
[87]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[88]  
Hosseinian H., 2019, 4 INT C COMB CRYPT C, P245
[89]   The security and privacy of smart vehicles [J].
Hubaux, JP ;
Capkun, S ;
Luo, J .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :49-55
[90]   A Framework for Malicious Traffic Detection in IoT Healthcare Environment [J].
Hussain, Faisal ;
Abbas, Syed Ghazanfar ;
Shah, Ghalib A. ;
Pires, Ivan Miguel ;
Fayyaz, Ubaid U. ;
Shahzad, Farrukh ;
Garcia, Nuno M. ;
Zdravevski, Eftim .
SENSORS, 2021, 21 (09)