Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

被引:25
作者
Cherbal, Sarra [1 ]
Zier, Abdelhak [1 ]
Hebal, Sara [1 ]
Louail, Lemia [2 ]
Annane, Boubakeur [1 ]
机构
[1] Univ Ferhat Abbas Setif 1, Fac Sci, Dept Comp Sci, LRSD Lab, Setif, Algeria
[2] Univ Lorraine, CNRS, CRAN, F-54000 Nancy, France
基金
英国科研创新办公室;
关键词
Internet of Things (IoT); Security; Blockchain; Machine learning; Cryptography; Quantum computing; IOT SECURITY; LIGHTWEIGHT CRYPTOGRAPHY; INDUSTRIAL INTERNET; SCHEME; CHALLENGES; ENCRYPTION; TRUST;
D O I
10.1007/s11227-023-05616-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an important virtual network that allows remote users to access linked multimedia devices. The development of IoT and its ubiquitous application across various domains of everyday life has led to continuous research efforts. Security is a perceptual concern for researchers involved in IoT as it is a key factor in the acceptance of any innovative technology. Numerous research studies have been conducted concentrating on the level of IoT security on a particular mechanism, on specific applications, or on categorizing vulnerabilities, in order to address a defined situation of securing an IoT network. This present paper aims to comprehensively review potential solutions for securing IoT, between emerging and traditional mechanisms, such as blockchain, machine learning, cryptography, and quantum computing. This study provides a comparative analysis of related papers with their characteristics, pros and cons. Accordingly, it taxonomizes relevant solutions based on their achieved security requirements. Furthermore, the potential benefits and challenges of each of the four mechanisms are discussed.
引用
收藏
页码:3738 / 3816
页数:79
相关论文
共 147 条
[91]   Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework [J].
Mazhar, Muhammad Shoaib ;
Saleem, Yasir ;
Almogren, Ahmad ;
Arshad, Jehangir ;
Jaffery, Mujtaba Hussain ;
Rehman, Ateeq Ur ;
Shafiq, Muhammad ;
Hamam, Habib .
ELECTRONICS, 2022, 11 (07)
[92]   Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques [J].
Mihoub, Alaeddine ;
Ben Fredj, Ouissem ;
Cheikhrouhou, Omar ;
Derhab, Abdelouahid ;
Krichen, Moez .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
[93]  
Mohanta Bhabendu K., 2019, 2019 International Conference on Information Technology (ICIT), P394, DOI 10.1109/ICIT48102.2019.00076
[94]   Federated-Learning-Based Anomaly Detection for IoT Security Attacks [J].
Mothukuri, Viraaji ;
Khare, Prachi ;
Parizi, Reza M. ;
Pouriyeh, Seyedamin ;
Dehghantanha, Ali ;
Srivastava, Gautam .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2545-2554
[95]   Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system [J].
Mousavi, Seyyed Keyvan ;
Ghaffari, Ali .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
[96]   Security of internet of things based on cryptographic algorithms: a survey [J].
Mousavi, Seyyed Keyvan ;
Ghaffari, Ali ;
Besharat, Sina ;
Afshari, Hamed .
WIRELESS NETWORKS, 2021, 27 (02) :1515-1555
[97]   Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT [J].
Musleh, Dhiaa ;
Alotaibi, Meera ;
Alhaidari, Fahd ;
Rahman, Atta ;
Mohammad, Rami M. .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (02)
[98]   Blockchain-Based Security Mechanism for the Medical Data at Fog Computing Architecture of Internet of Things [J].
Ngabo, Desire ;
Wang, Dong ;
Iwendi, Celestine ;
Anajemba, Joseph Henry ;
Ajao, Lukman Adewale ;
Biamba, Cresantus .
ELECTRONICS, 2021, 10 (17)
[99]  
Nikam Sagar S., 2015, Oriental Journal of Computer Science and Technology, V8, P13
[100]   The internet of things security: A survey encompassing unexplored areas and new insights [J].
Omolara, Abiodun Esther ;
Alabdulatif, Abdullah ;
Abiodun, Oludare Isaac ;
Alawida, Moatsum ;
Alabdulatif, Abdulatif ;
Alshoura, Wafa' Hamdan ;
Arshad, Humaira .
COMPUTERS & SECURITY, 2022, 112