IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

被引:57
|
作者
Anand, Pooja [1 ]
Singh, Yashwant [1 ]
Selwal, Arvind [1 ]
Alazab, Mamoun [2 ]
Tanwar, Sudeep [3 ]
Kumar, Neeraj [4 ,5 ,6 ]
机构
[1] Cent Univ Jammu, Dept Comp Sci & Informat Technol, Jammu 181143, India
[2] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
[3] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, India
[4] Thapar Inst Engn & Technol, Dept Comp Sci Engn, Patiala 147004, Punjab, India
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah 80200, Saudi Arabia
来源
IEEE ACCESS | 2020年 / 8卷 / 168825-168853期
关键词
Security; Protocols; Internet of Things; Computer architecture; Temperature sensors; IoT; machine learning; sustainability; cyberattacks; vulnerabilities; security; privacy; CYBER-PHYSICAL SYSTEMS; SECURITY ARCHITECTURE; LEARNING APPROACH; DATA ANALYTICS; AI TECHNIQUES; BIG DATA; INTERNET; THINGS; FRAMEWORK; TAXONOMY;
D O I
10.1109/ACCESS.2020.3022842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving security issues in IoT systems and make them self-sufficient to harvest energy for smooth functioning. Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. Moreover, we provide a general overview of IoT, Sustainable IoT, its architecture, and the Internet Engineering Task Force (IETF) protocol suite. Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. Then we have specifically focused on the IoT Vulnerability Assessment techniques followed by a case study on sustainability of Smart Agriculture. Finally, this paper outlines the emerging challenges related to IoT and its sustainability, and opening the doors for the beginners to start research in this promising area.
引用
收藏
页码:168825 / 168853
页数:29
相关论文
共 35 条
  • [21] Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions
    Zhukabayeva, Tamara
    Zholshiyeva, Lazzat
    Karabayev, Nurdaulet
    Khan, Shafiullah
    Alnazzawi, Noha
    SENSORS, 2025, 25 (01)
  • [22] Software-Defined Edge Computing (SDEC): Principle, Open IoT System Architecture, Applications, and Challenges
    Hu, Pengfei
    Chen, Wai
    He, Chunming
    Li, Yiping
    Ning, Huansheng
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 5934 - 5945
  • [23] Emerging IoT domains, current standings and open research challenges: a review
    Ali, Omer
    Ishak, Mohamad Khairi
    Bhatti, Muhammad Kamran Liaquat
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 49
  • [24] Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC
    Raheema, Alaa Q.
    WIRELESS NETWORKS, 2024, 30 (08) : 6887 - 6900
  • [25] An analysis of security challenges and their perspective solutions for cloud computing and IoT
    Muhammad, Muhammad Hassan Ghulam
    Alyas, Tahir
    Ahmad, Faraz
    Butt, Fatima Hassan
    Qazi, Wajahat Mahmood
    Saqib, Shazia
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2021, 8 (30) : 1 - 11
  • [26] A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions
    Kim, Nam Yong
    Rathore, Shailendra
    Ryu, Jung Hyun
    Park, Jin Ho
    Park, Jong Hyuk
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (06): : 1361 - 1384
  • [27] Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
    Jazaeri, Seyedeh Shabnam
    Jabbehdari, Sam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3187 - 3228
  • [28] Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity
    Hassan, Ali
    Nizam-Uddin, N.
    Quddus, Asim
    Hassan, Syed Rizwan
    Rehman, Ateeq Ur
    Bharany, Salil
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (03): : 3499 - 3559
  • [29] Towards sustainable smart IoT applications architectural elements and design: opportunities, challenges, and open directions
    Zainab H. Ali
    Hesham A. Ali
    The Journal of Supercomputing, 2021, 77 : 5668 - 5725
  • [30] Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues
    Jazaeri, Seyedeh Shabnam
    Asghari, Parvaneh
    Jabbehdari, Sam
    Javadi, Hamid Haj Seyyed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 1311 - 1377