A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

被引:151
作者
Mrabet, Hichem [1 ,2 ]
Belguith, Sana [3 ]
Alhomoud, Adeeb [4 ]
Jemai, Abderrazak [5 ]
机构
[1] Saudi Elect Univ, Dept IT, Coll Comp & Informat, Medina 42376, Saudi Arabia
[2] Carthage Univ, Tunisia Polytech Sch, SERCOM Lab, Tunis 1054, Tunisia
[3] Univ Salford, Sch Sci Engn & Environm, Manchester M5 4WT, Lancs, England
[4] Saudi Elect Univ, Coll Sci & Theoret Studies, Dept Sci, Riyadh 11673, Saudi Arabia
[5] Carthage Univ, Tunisia Polytech Sch, SERCOM Lab, INSAT, Tunis 1080, Tunisia
关键词
wearable and non-wearable devices; IoT; communication protocol; security attacks and countermeasures; data analysis; ATTRIBUTE-BASED ENCRYPTION; INTRUSION DETECTION; INTERNET; THINGS; BLOCKCHAIN; AUTHENTICATION; NETWORKS; PRIVACY; SERVICE; DEFENSE;
D O I
10.3390/s20133625
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is leading today's digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
引用
收藏
页码:1 / 20
页数:19
相关论文
共 87 条
[1]  
Aamir M., 2013, INTERDISCIP INF SCI, V19, P173, DOI DOI 10.4036/iis.2013.173
[2]  
Abrams M, 2008, MITRE CORP US WWW MI
[3]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[4]  
Alhomoud A., SEFHEALING FRAMEWORK
[5]   Applications of Generative Adversarial Networks (GANs): An Updated Review [J].
Alqahtani, Hamed ;
Kavakli-Thorne, Manolya ;
Kumar, Gulshan .
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2021, 28 (02) :525-552
[6]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[7]  
[Anonymous], 2014, COMPUT NETW
[8]  
[Anonymous], 2009, 2009516 IACR CRYPT E
[9]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[10]   Internet of Things applications: A systematic review [J].
Asghari, Parvaneh ;
Rahmani, Amir Masoud ;
Javadi, Hamid Haj Seyyed .
COMPUTER NETWORKS, 2019, 148 :241-261