Navigating IoT Security: Architectures, Emerging Threats, and Adaptive Countermeasures

被引:0
作者
Kandah, Farah [1 ]
Mendis, Thilina [1 ]
Medury, Lalith [1 ]
Sherawat, Hemant [1 ]
Wang, Haofan [1 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
关键词
IoT; security; architecture; countermeasures; cloud; edge; fog;
D O I
10.1109/ACCESS.2025.3576355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has revolutionized modern life, yet its interconnected nature poses significant security challenges. This survey investigates threats and countermeasures associated with IoT ecosystems, categorizes threats targeting network infrastructure, devices, and data security, and provides a taxonomy to understand vulnerabilities. By analyzing IoT architectures-including Cloud, Fog, and Edge-the study highlights how each architecture presents distinct vulnerabilities when integrated with IoT systems. It explores research on several countermeasures, including intrusion detection systems, secure authentication protocols, blockchain technology, and machine learning integration, evaluating both their advantages and limitations. Through a systematic review of recent literature, the survey identifies articles that contribute to IoT security understanding.The study advocates for lightweight, adaptable security measures that can be applied across diverse architectures and emphasizes the importance of standardized protocols through collaborative efforts among stakeholders. By mapping the current IoT security landscape, this survey guides future research and development toward a more secure and resilient IoT ecosystem, emphasizing the need for both innovation and standardization. Additionally, it critically evaluates the effectiveness of existing solutions and provides actionable insights into addressing the evolving security challenges within IoT environments.
引用
收藏
页码:98888 / 98908
页数:21
相关论文
共 93 条
[31]  
Hameed A, 2019, 2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT)
[32]   Survey on smart homes: Vulnerabilities, risks, and countermeasures [J].
Hammi, Badis ;
Zeadally, Sherali ;
Khatoun, Rida ;
Nebhen, Jamel .
COMPUTERS & SECURITY, 2022, 117
[33]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[34]  
Hemalatha T., 2023, 2023 7th International Conference on Electronics, Communication and Aerospace Technology (ICECA), P1349, DOI 10.1109/ICECA58529.2023.10395098
[35]   INTERNET OF THINGS CLOUD: ARCHITECTURE AND IMPLEMENTATION [J].
Hou, Lu ;
Zhao, Shaohang ;
Xiong, Xiong ;
Zheng, Kan ;
Chatzimisios, Periklis ;
Hossain, M. Shamim ;
Xiang, Wei .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) :32-39
[36]   SecSoC: A Secure System on Chip Architecture for IoT Devices [J].
Hroub, Ayman ;
Elrabaa, Muhammad E. S. .
2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, :41-44
[37]  
I. Consortium, 2025, Insectt-Intelligent Secure Trustable Things
[38]  
IEEE, Advancing Technology for Humanity
[39]  
International Organization for Standardization, ISO/IEC 17025: 2017)
[40]  
Iorga M., 2018, NIST Special Publication, V500, P1