IoT security: Review, blockchain solutions, and open challenges

被引:1312
作者
Khan, Minhaj Ahmad [1 ]
Salah, Khaled [2 ]
机构
[1] Bahauddin Zakariya Univ Multan, Multan, Pakistan
[2] Khalifa Univ Sci Technol & Res, Sharjah, U Arab Emirates
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 82卷
关键词
IoT security; Blockchain; IoT protocols; Network security; Data security; INTRUSION DETECTION SYSTEMS; ROUTING PROTOCOL; INTERNET; THINGS; ATTACKS; AUTHENTICATION; PRIVACY; SECRECY; TRUST;
D O I
10.1016/j.future.2017.11.022
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:395 / 411
页数:17
相关论文
共 134 条
[31]  
[Anonymous], 2011, COMPRESSION FORMAT I
[32]  
Antonopoulos A. M., 2014, Mastering Bitcoin: Unlocking Digital Cryptocurrencies
[33]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[34]  
Axon Louise., 2015, Cdt Tech. Pap. Ser., V21, P15
[35]  
Bahga A., 2016, TECH REP
[36]  
Bhattasali T, 2011, COMM COM INF SC, V196, P268
[37]  
Bohli J.-M., 2015, 2015 international conference on recent advances in internet of things (riot), P1, DOI DOI 10.1109/RIOT.2015.7104906
[38]  
Brachmann M., 2011, 10 GI ITG KUVS FACHG
[39]  
BUTLER-Consortium, 2014, BUTLER SMARTL UBIQUI
[40]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282