Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications

被引:14
作者
Khan, Yasser [1 ,2 ]
Su'ud, Mazliham Bin Mohd [1 ]
Alam, Muhammad Mansoor [3 ]
Ahmad, Sayed Fayaz [4 ]
Salim, Nur Agus [5 ]
Khan, Nasir [6 ]
机构
[1] Multimedia Univ, Res Management Ctr, Cyberjaya 63100, Malaysia
[2] Iqra Natl Univ, Dept Elect Engn, Peshawar 25100, Pakistan
[3] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[4] Inst Business Management, Dept Engn Management, Karachi 75190, Pakistan
[5] Univ Widya Gama Mahakam Samarinda, Elementary Sch Teacher Educ, Kota Samarinda 75243, Indonesia
[6] Univ Chakwal, Dept Petr & Gas Engn, Chakwal 48800, Pakistan
关键词
internet of things; IoT architecture; security challenges; privacy; SMART CITIES; HOME; TECHNOLOGY; MANAGEMENT;
D O I
10.3390/electronics12010088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is one of the growing platforms of the current era that has encircled a large population into its domain, and life appears to be useless without adopting this technology. A significant amount of data is generated from an immense number of smart devices and their allied applications that are constructively utilized to automate our daily life activities. This big data requires fast processing, storage, and safe passage through secure channels to safeguard it from any malicious attacks. In such a situation, security is considered crucial to protect the technological resources from unauthorized access or any interruption to disrupt the seamless and ubiquitous connectivity of the IoT from the perception layer to cloud computers. Motivated by this, this article demonstrates a general overview about the technology and layered architecture of the IoT followed by critical applications with a particular focus on key features of smart homes, smart agriculture, smart transportation, and smart healthcare. Next, security threats and vulnerabilities included with attacks on each layer of the IoT are explicitly elaborated. The classification of security challenges such as confidentiality, integrity, privacy, availability, authentication, non-repudiation, and key management is thoroughly reviewed. Finally, future research directions for security concerns are identified and presented.
引用
收藏
页数:20
相关论文
共 117 条
  • [91] A visual review of artificial intelligence and Industry 4.0 in healthcare
    Sood, Sandeep Kumar
    Rawat, Keshav Singh
    Kumar, Dheeraj
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [92] A systematic review of IoT communication strategies for an efficient smart environment
    Souri, Alireza
    Hussien, Aseel
    Hoseyninezhad, Mahdi
    Norouzi, Monire
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [93] Tamrakar A., 2022, INT J HLTH SCI, V10, P234
  • [94] Thilakarathne Navod Neranjan, 2022, Applied Information Processing Systems: Proceedings of ICCET 2021. Advances in Intelligent Systems and Computing (1354), P391, DOI 10.1007/978-981-16-2008-9_38
  • [95] Thomas Michael Onuoha, 2017, International Journal of Information Technology and Computer Science, V9, P1, DOI 10.5815/ijitcs.2017.02.01
  • [96] Tripathy AK, 2017, 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), P1236, DOI 10.1109/ICICICT1.2017.8342746
  • [97] On Group Ownership Delegate Protocol for RFID Systems
    Tu, Yu-Ju
    Kapoor, Gaurav
    Piramuthu, Selwyn
    [J]. INFORMATION SYSTEMS FRONTIERS, 2022, 24 (05) : 1577 - 1584
  • [98] Upendar K., 2022, MACHINE VISION IND 4, P63
  • [99] Vijayalakshmi A., 2021, IoT in Healthcare and Ambient Assisted Living, P123
  • [100] Analyzing the Adoption Challenges of the Internet of Things (IoT) and Artificial Intelligence (AI) for Smart Cities in China
    Wang, Ke
    Zhao, Yafei
    Gangadhari, Rajan Kumar
    Li, Zhixing
    [J]. SUSTAINABILITY, 2021, 13 (19)