IoT security: Review, blockchain solutions, and open challenges

被引:1312
作者
Khan, Minhaj Ahmad [1 ]
Salah, Khaled [2 ]
机构
[1] Bahauddin Zakariya Univ Multan, Multan, Pakistan
[2] Khalifa Univ Sci Technol & Res, Sharjah, U Arab Emirates
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 82卷
关键词
IoT security; Blockchain; IoT protocols; Network security; Data security; INTRUSION DETECTION SYSTEMS; ROUTING PROTOCOL; INTERNET; THINGS; ATTACKS; AUTHENTICATION; PRIVACY; SECRECY; TRUST;
D O I
10.1016/j.future.2017.11.022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:395 / 411
页数:17
相关论文
共 134 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]   Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks [J].
Ahmed, Firoz ;
Ko, Young-Bae .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5143-5154
[3]   White space: Definitional perspectives and their role in exploiting spectrum opportunities [J].
Akhtar, Fayaz ;
Rehmani, Mubashir Husain ;
Reisslein, Martin .
TELECOMMUNICATIONS POLICY, 2016, 40 (04) :319-331
[4]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[5]  
All-In-Bits, 2017, ALL IN BITS INTRO TE
[6]   SoK: The Evolution of Sybil Defense via Social Networks [J].
Alvisi, Lorenzo ;
Clement, Allen ;
Epasto, Alessandro ;
Lattanzi, Silvio ;
Panconesi, Alessandro .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :382-396
[7]   The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks [J].
Anhtuan Le ;
Loo, Jonathan ;
Lasebae, Aboubaker ;
Vinel, Alexey ;
Chen, Yue ;
Chai, Michael .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3685-3692
[8]  
[Anonymous], 2014, INT J INNOV RES COMP
[9]  
[Anonymous], 2016, ECONOTIMES
[10]  
[Anonymous], IETF STANDARDS