Cybersecurity Risk Analysis in the IoT: A Systematic Review

被引:16
作者
Alsalem, Thanaa Saad [1 ]
Almaiah, Mohammed Amin [2 ,3 ]
Lutfi, Abdalwali [4 ,5 ]
Shin, Seokjoo
机构
[1] King Faisal Univ, Dept Informat Syst, Al Hasa 31982, Saudi Arabia
[2] Aqaba Univ Technol, Dept Comp Sci, Aqaba 11947, Jordan
[3] Univ Jordan, King Abdullah IT Sch 2, Amman 11942, Jordan
[4] King Faisal Univ, Sch Business, Al Hasa 31982, Saudi Arabia
[5] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
Internet of Things (IoT); cybersecurity; cybersecurity frameworks; cybersecurity approaches; INTERNET; THREATS; THINGS;
D O I
10.3390/electronics12183958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising significant concerns about future cybersecurity risks and the need for reliable solutions. This study conducts a comprehensive systematic literature review to examine the various challenges and attacks threatening IoT cybersecurity, as well as the proposed frameworks and solutions. Furthermore, it explores emerging trends and identifies existing gaps in this domain. The study's novelty lies in its extensive exploration of machine learning techniques for detecting and countering IoT threats. It also contributes by highlighting research gaps in economic impact assessment and industrial IoT security. The systematic review analyzes 40 articles, providing valuable insights and guiding future research directions. Results show that privacy issues and cybercrimes are the primary concerns in IoT security, and artificial intelligence holds promise for future cybersecurity. However, some attacks remain inadequately addressed by existing solutions, such as confidentiality, security authentication, and data server connection attacks, necessitating further research and real-life testing of proposed remedies.
引用
收藏
页数:19
相关论文
共 57 条
[1]  
Abdullah A., 2019, 2019 2 INT C COMP, P1, DOI [10.1109/CAIS.2019.8769560, DOI 10.1109/cais.2019.8769560]
[2]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, V4, P65, DOI [DOI 10.13052/JCSM2245-1439.414, 10.13052/jcsm2245-1439.414]
[3]  
Ahmed AW, 2017, INT J ADV COMPUT SC, V8, P489
[4]  
Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
[5]  
Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
[6]   An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network [J].
Ali, Aitizaz ;
Almaiah, Mohammed Amin ;
Hajjej, Fahima ;
Pasha, Muhammad Fermi ;
Fang, Ong Huey ;
Khan, Rahim ;
Teo, Jason ;
Zakarya, Muhammad .
SENSORS, 2022, 22 (02)
[7]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[8]  
Almaiah M.A., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, P217
[9]   A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things [J].
Almaiah, Mohammed Amin ;
Ali, Aitizaz ;
Hajjej, Fahima ;
Pasha, Muhammad Fermi ;
Alohali, Manal Abdullah .
SENSORS, 2022, 22 (06)
[10]  
Almaiah MA, 2022, SENSORS-BASEL, V22, DOI 10.3390/s22041448