A Comprehensive Review of the Internet of Things Security

被引:31
作者
Ahmid, Maroua [1 ]
Kazar, Okba [1 ]
机构
[1] Mohamed Khider Univ, Dept Comp Sci, LINFI Lab, Biskra, Algeria
关键词
Internet of Things; IoT architecture; attacks; security challenges; security requirements; PROTOCOLS;
D O I
10.1080/19361610.2021.1962677
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.
引用
收藏
页码:289 / 305
页数:17
相关论文
共 21 条
[1]  
Ahmid Maroua, 2021, 2021 International Conference on Information Technology (ICIT), P1, DOI 10.1109/ICIT52682.2021.9491113
[2]  
Ahmid Maroua, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P291, DOI 10.1109/ICIoT48696.2020.9089602
[3]  
Akhtar, 2019, INTERNET THINGS CLOU, V7, P80, DOI [https://doi.org/10.11648/j.iotcc.20190703.14, DOI 10.11648/J.IOTCC.20190703.14]
[4]   Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
AD HOC NETWORKS, 2017, 56 :122-140
[5]   Software-Defined Networking for Internet of Things: A Survey [J].
Bera, Samaresh ;
Misra, Sudip ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1994-2008
[6]   A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology [J].
Bouaziz, Maha ;
Rachedi, Abderrezak .
COMPUTER COMMUNICATIONS, 2016, 74 :3-15
[7]   Network Intrusion Detection for IoT Security Based on Learning Techniques [J].
Chaabouni, Nadia ;
Mosbah, Mohamed ;
Zemmari, Akka ;
Sauvignac, Cyrille ;
Faruki, Parvez .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2671-2701
[8]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[9]  
Ghodous, 2015, 2015 INT C FUT COMP, P158
[10]   Securing the Internet of Things: Challenges, threats and solutions [J].
Grammatikis, Panagiotis I. Radoglou ;
Sarigiannidis, Panagiotis G. ;
Moscholios, Ioannis D. .
INTERNET OF THINGS, 2019, 5 :41-70