IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

被引:63
作者
Anand, Pooja [1 ]
Singh, Yashwant [1 ]
Selwal, Arvind [1 ]
Alazab, Mamoun [2 ]
Tanwar, Sudeep [3 ]
Kumar, Neeraj [4 ,5 ,6 ]
机构
[1] Cent Univ Jammu, Dept Comp Sci & Informat Technol, Jammu 181143, India
[2] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
[3] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, India
[4] Thapar Inst Engn & Technol, Dept Comp Sci Engn, Patiala 147004, Punjab, India
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah 80200, Saudi Arabia
关键词
Security; Protocols; Internet of Things; Computer architecture; Temperature sensors; IoT; machine learning; sustainability; cyberattacks; vulnerabilities; security; privacy; CYBER-PHYSICAL SYSTEMS; SECURITY ARCHITECTURE; LEARNING APPROACH; DATA ANALYTICS; AI TECHNIQUES; BIG DATA; INTERNET; THINGS; TAXONOMY; PRIVACY;
D O I
10.1109/ACCESS.2020.3022842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving security issues in IoT systems and make them self-sufficient to harvest energy for smooth functioning. Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. Moreover, we provide a general overview of IoT, Sustainable IoT, its architecture, and the Internet Engineering Task Force (IETF) protocol suite. Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. Then we have specifically focused on the IoT Vulnerability Assessment techniques followed by a case study on sustainability of Smart Agriculture. Finally, this paper outlines the emerging challenges related to IoT and its sustainability, and opening the doors for the beginners to start research in this promising area.
引用
收藏
页码:168825 / 168853
页数:29
相关论文
共 175 条
[1]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[2]  
Ahlmeyer M., 2016, Issues in Information Systems, V17, P21, DOI DOI 10.48009/4IIS201621-28
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications [J].
Amaral, Leonardo A. ;
Hessel, Fabiano P. ;
Bezerra, Eduardo A. ;
Correa, Jeronimo C. ;
Longhi, Oliver B. ;
Dias, Thiago F. O. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) :972-979
[5]  
[Anonymous], 2019, IEEE COMMUN MAG, DOI DOI 10.1080/09603123.2019.1680819
[6]   Privacy and Security in Internet of Things and Wearable Devices [J].
Arias, Orlando ;
Wurm, Jacob ;
Khoa Hoang ;
Jin, Yier .
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02) :99-109
[7]  
Assaderaghi F, 2017, S VLSI TECH, pT8, DOI 10.23919/VLSIT.2017.7998185
[8]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[9]  
Azab A, 2016, IEEE TRUST BIG, P1788, DOI [10.1109/TrustCom.2016.273, 10.1109/TrustCom.2016.0275]
[10]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95