A comprehensive study on cybersecurity challenges and opportunities in the IoT world

被引:47
作者
Lone, Aejaz Nazir [1 ]
Mustajab, Suhel [1 ]
Alam, Mahfooz [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh, India
关键词
CIA triad; cybersecurity; cyber-attacks; internet of things (IoT); IoT layer; security; INTRUSION DETECTION SYSTEM; INDUSTRIAL INTERNET; ACCESS-CONTROL; BLOCKCHAIN; SECURITY; FRAMEWORK; THINGS; PRIVACY; COUNTERMEASURES; MITIGATION;
D O I
10.1002/spy2.318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has become possible to link anything and everything to the Internet in recent decades due to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a lot, causing digital disruption in the real world. IoT allows drones, sensors, digital set-top boxes, surveillance cameras, wearable technology, and medical equipment to be connected to the internet. Healthcare, manufacturing, utilities, transportation, and housing are among the various sectors that has become intelligent. Recently, we have seen a surge in cybersecurity challenges and opportunities for the improvement of various IoT applications. Although cybersecurity and the IoT are extensively researched, there is a dearth of studies that exclusively focus on the evolution of cybersecurity challenges in the area of AI and machine learning, blockchain and zero trust, lightweight security, integration of IoT with 5G networks, and many more in the IoT world. The availability of environment-capturing sensors and internet-connected tracking devices allows for private life surveillance and cloud data transmission. Therefore, a significant problem for researchers and developers is to ensure the CIA (Confidentiality, Integrity, and Availability) security triangle for people. This paper presents a comprehensive study of cybersecurity applications, challenges, and opportunities in the IoT world. The IoT architectural layer, attacks against the IoT layer, and related issues are highlighted. Furthermore, cybersecurity issues and challenges in IoT along with the strength and weaknesses of existing techniques are discussed in detail. Our study will provide insight into various current cybersecurity research trends in the IoT world.
引用
收藏
页数:37
相关论文
共 128 条
[1]   Quantum-Inspired Blockchain-Based Cybersecurity: Securing Smart Edge Utilities in IoT-Based Smart Cities [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Mehmood, Irfan ;
Muhammad, Khan ;
Venegas-Andraca, Salvador E. ;
Peng, Jialiang .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (04)
[2]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]  
Alam Mahfooz, 2022, Congress on Intelligent Systems: Proceedings of CIS 2021. Lecture Notes on Data Engineering and Communications Technologies (114), P233, DOI 10.1007/978-981-16-9416-5_17
[5]  
ALAM M., 2017, INDIAN J SCI TECHNOL, V10, P1, DOI DOI 10.17485/ijst/2017/v10i25/105688
[6]   Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment [J].
Alam, Mahfooz ;
Shahid, Mohammad ;
Mustajab, Suhel .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01) :341-376
[7]   Effective framework to tackle urban unemployment by e-government: an IoT solution for smart/metro cities in developing nation [J].
Alam, Mahfooz ;
Siddiqui, Mohd Ibrahim .
JOURNAL OF SCIENCE AND TECHNOLOGY POLICY MANAGEMENT, 2023, 14 (01) :213-238
[8]  
Alamaniotis M., 2021, 2021 12th International Conference on Information, Intelligence, Systems Applications (IISA), Chania Crete, Greece, 1214 July 2021, P1
[9]  
Alexander RD, 2017, PROT CRIT INFRASTRUC, V3, P19, DOI 10.1007/978-3-319-32824-9_2
[10]  
Ali MM, 2022, INT J ED REFORM, V57, DOI [10.1177/10567879221082, DOI 10.1177/10567879221082]