Current research on Internet of Things (IoT) security: A survey

被引:491
作者
Noor, Mardiana Binti Mohamad [1 ]
Hassan, Wan Haslina [1 ]
机构
[1] Univ Teknol Malaysia, MJIIT, CSN, Kuala Lumpur, Malaysia
关键词
IoT security; Challenges; Current research; Simulation; USER AUTHENTICATION SCHEME; ENABLED DEVICES; GAME-THEORY; LOW-POWER; BIG DATA; PROTOCOL; ATTACKS; SYSTEM; TRUST; MANAGEMENT;
D O I
10.1016/j.comnet.2018.11.025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The results of IoT failures can be severe, therefore, the study and research in security issues in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy, confidentiality, ensure the security of the users, infrastructures, data, and devices of the IoT, and guarantee the availability of the services offered by an IoT ecosystem. Thus, research in IoT security has recently been gaining much momentum with the help of the available simulation tools, modellers, and computational and analysis platforms. This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues. The main contribution of this paper is to provide an overview of the current state of IoT security research, the relevant tools, IoT modellers and simulators. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:283 / 294
页数:12
相关论文
共 96 条
[1]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[2]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[5]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[6]   AODV routing protocol for Cognitive radio access based Internet of Things (IoT) [J].
Anamalamudi, Satish ;
Sangi, Abdur Rashid ;
Alkatheiri, Mohammed ;
Ahmed, Ahmedin Mohammed .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 :228-238
[7]  
[Anonymous], IEEE T INFORM FORENS
[8]   TACIoT: multidimensional trust-aware access control system for the Internet of Things [J].
Bernal Bernabe, Jorge ;
Hernandez Ramos, Jose Luis ;
Skarmeta Gomez, Antonio F. .
SOFT COMPUTING, 2016, 20 (05) :1763-1779
[9]   AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications [J].
Bui, Duy-Hieu ;
Puschini, Diego ;
Bacles-Min, Simone ;
Beigne, Edith ;
Tran, Xuan-Tu .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) :3281-3290
[10]   A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things [J].
Caminha, Jean ;
Perkusich, Angelo ;
Perkusich, Mirko .
SECURITY AND COMMUNICATION NETWORKS, 2018,