Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications

被引:14
作者
Khan, Yasser [1 ,2 ]
Su'ud, Mazliham Bin Mohd [1 ]
Alam, Muhammad Mansoor [3 ]
Ahmad, Sayed Fayaz [4 ]
Salim, Nur Agus [5 ]
Khan, Nasir [6 ]
机构
[1] Multimedia Univ, Res Management Ctr, Cyberjaya 63100, Malaysia
[2] Iqra Natl Univ, Dept Elect Engn, Peshawar 25100, Pakistan
[3] Riphah Int Univ, Fac Comp, Islamabad 46000, Pakistan
[4] Inst Business Management, Dept Engn Management, Karachi 75190, Pakistan
[5] Univ Widya Gama Mahakam Samarinda, Elementary Sch Teacher Educ, Kota Samarinda 75243, Indonesia
[6] Univ Chakwal, Dept Petr & Gas Engn, Chakwal 48800, Pakistan
关键词
internet of things; IoT architecture; security challenges; privacy; SMART CITIES; HOME; TECHNOLOGY; MANAGEMENT;
D O I
10.3390/electronics12010088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet of things (IoT) is one of the growing platforms of the current era that has encircled a large population into its domain, and life appears to be useless without adopting this technology. A significant amount of data is generated from an immense number of smart devices and their allied applications that are constructively utilized to automate our daily life activities. This big data requires fast processing, storage, and safe passage through secure channels to safeguard it from any malicious attacks. In such a situation, security is considered crucial to protect the technological resources from unauthorized access or any interruption to disrupt the seamless and ubiquitous connectivity of the IoT from the perception layer to cloud computers. Motivated by this, this article demonstrates a general overview about the technology and layered architecture of the IoT followed by critical applications with a particular focus on key features of smart homes, smart agriculture, smart transportation, and smart healthcare. Next, security threats and vulnerabilities included with attacks on each layer of the IoT are explicitly elaborated. The classification of security challenges such as confidentiality, integrity, privacy, availability, authentication, non-repudiation, and key management is thoroughly reviewed. Finally, future research directions for security concerns are identified and presented.
引用
收藏
页数:20
相关论文
共 117 条
  • [31] Crowdsourced Road Navigation: Concept, Design, and Implementation
    Fan, Xiaoyi
    Liu, Jiangchuan
    Wang, Zhi
    Jiang, Yong
    Liu, Xue
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) : 126 - 131
  • [32] Anomaly traffic detection and correlation in Smart Home automationIoTsystems
    Gajewski, Mariusz
    Batalla, Jordi Mongay
    Mastorakis, George
    Mavromoustakis, Constandinos X.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)
  • [33] Sensor-Based Technologies in Sugarcane Agriculture
    Garcia, Angel Pontin
    Umezu, Claudio Kiyoshi
    Moriones Polania, Edna Carolina
    Dias Neto, Americo Ferraz
    Rossetto, Raffaella
    Albiero, Daniel
    [J]. SUGAR TECH, 2022, 24 (03) : 679 - 698
  • [34] Ultrasonic Sensing of Plant Water Needs for Agriculture
    Gomez Alvarez-Arenas, Tomas
    Gil-Pelegrin, Eustaquio
    Ealo Cuello, Joao
    Dolores Farinas, Maria
    Sancho-Knapik, Domingo
    Collazos Burbano, David Alejandro
    Javier Peguero-Pina, Jose
    [J]. SENSORS, 2016, 16 (07)
  • [35] Deep Learning in Data-Driven Pavement Image Analysis and Automated Distress Detection: A Review
    Gopalakrishnan, Kasthurirangan
    [J]. DATA, 2018, 3 (03)
  • [36] Haque N.I., 2021, CORR
  • [37] Strategic management of next-generation connected life: Focusing on smart key and car-home connectivity
    Hong, Jihoon
    Shin, Jungwoo
    Lee, Daeho
    [J]. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2016, 103 : 11 - 20
  • [38] A Review of Applications and Communication Technologies for Internet of Things (IoT) and Unmanned Aerial Vehicle (UAV) Based Sustainable Smart Farming
    Islam, Nahina
    Rashid, Md Mamunur
    Pasandideh, Faezeh
    Ray, Biplob
    Moore, Steven
    Kadel, Rajan
    [J]. SUSTAINABILITY, 2021, 13 (04) : 1 - 20
  • [39] Agriculture as a funding source of ISIS: A GIS and remote sensing analysis
    Jaafar, Hadi H.
    Woertz, Eckart
    [J]. FOOD POLICY, 2016, 64 : 14 - 25
  • [40] A cross layer protocol for traffic management in Social Internet of Vehicles
    Jain, Bindiya
    Brar, Gursewak
    Malhotra, Jyoteesh
    Rani, Shalli
    Ahmed, Syed Hassan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 707 - 714