Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications

被引:14
作者
Khan, Yasser [1 ,2 ]
Su'ud, Mazliham Bin Mohd [1 ]
Alam, Muhammad Mansoor [3 ]
Ahmad, Sayed Fayaz [4 ]
Salim, Nur Agus [5 ]
Khan, Nasir [6 ]
机构
[1] Multimedia Univ, Res Management Ctr, Cyberjaya 63100, Malaysia
[2] Iqra Natl Univ, Dept Elect Engn, Peshawar 25100, Pakistan
[3] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[4] Inst Business Management, Dept Engn Management, Karachi 75190, Pakistan
[5] Univ Widya Gama Mahakam Samarinda, Elementary Sch Teacher Educ, Kota Samarinda 75243, Indonesia
[6] Univ Chakwal, Dept Petr & Gas Engn, Chakwal 48800, Pakistan
关键词
internet of things; IoT architecture; security challenges; privacy; SMART CITIES; HOME; TECHNOLOGY; MANAGEMENT;
D O I
10.3390/electronics12010088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is one of the growing platforms of the current era that has encircled a large population into its domain, and life appears to be useless without adopting this technology. A significant amount of data is generated from an immense number of smart devices and their allied applications that are constructively utilized to automate our daily life activities. This big data requires fast processing, storage, and safe passage through secure channels to safeguard it from any malicious attacks. In such a situation, security is considered crucial to protect the technological resources from unauthorized access or any interruption to disrupt the seamless and ubiquitous connectivity of the IoT from the perception layer to cloud computers. Motivated by this, this article demonstrates a general overview about the technology and layered architecture of the IoT followed by critical applications with a particular focus on key features of smart homes, smart agriculture, smart transportation, and smart healthcare. Next, security threats and vulnerabilities included with attacks on each layer of the IoT are explicitly elaborated. The classification of security challenges such as confidentiality, integrity, privacy, availability, authentication, non-repudiation, and key management is thoroughly reviewed. Finally, future research directions for security concerns are identified and presented.
引用
收藏
页数:20
相关论文
共 117 条
  • [1] Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions
    Adil, Muhammad
    Khan, Muhammad Khurram
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2021, 75 (75)
  • [2] Akmandor AO, 2017, IEEE T MULTI-SCALE C, V3, P269, DOI 10.1109/TMSCS.2017.2703613
  • [3] Al-Dweik A., 2017, 2017 IEEE 30 CANADIA, P1, DOI DOI 10.1109/CCECE.2017.7946618
  • [4] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [5] Deep learning for decentralized parking lot occupancy detection
    Amato, Giuseppe
    Carrara, Fabio
    Falchi, Fabrizio
    Gennaro, Claudio
    Meghini, Carlo
    Vairo, Claudio
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 72 : 327 - 334
  • [6] [Anonymous], 2017, Int Res J Eng Technol
  • [7] [Anonymous], 2017, AJSET
  • [8] [Anonymous], 1997, P ACM C COMP COMM SE, DOI 10.1145/266420.266426
  • [9] [Anonymous], 2017, Adv Comput Sci Technol.
  • [10] Araújo A, 2017, IEEE INT CONF BIG DA, P4086, DOI 10.1109/BigData.2017.8258426