Security and Privacy in IoT: A Survey

被引:114
作者
Chanal, Poornima M. [1 ]
Kakkasageri, Mahabaleshwar S. [1 ]
机构
[1] Basaveshwar Engn Coll Autonomous, Elect & Commun Engn Dept, Bagalkot 587103, Karnataka, India
关键词
Internet of things; Security; Privacy; AUTHENTICATION PROTOCOL; INTERNET; THINGS; CHALLENGES;
D O I
10.1007/s11277-020-07649-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Internet of Things (IoT) is a network of globally connected physical objects, which are associated with each other via Internet. The IoT foresees the interconnection of few trillions of intelligent objects around us, uniquely and addressable every day, these objects have the ability to accumulate process and communicate data about themselves and their surrounding environment. The best examples of IoT systems are health care, building smart city with advance construction management system, public and defense surveillance and data acquisition. Recent advancement in the technology has developed smart and intelligent sensor nodes and RFIDs lead to a large number of wireless networks with smart and intelligent devices (object, or things) connected to the Internet continuously transmit the data. So to provide security and privacy to this data in IoT is a very challenging task, which is to be concerned at highest priority for several current and future applications of IoT. Devices such as smart phone, WSNs and RFIDs etc., are the major components of IoT network which are basically resource constrained devices. Design and development of security and privacy management schemes for these devices is guided by factors like good performance, low power consumption, robustness to attacks, tampering of the data and end to end security. Security schemes in IoT provide unauthorized access to information or other objects by protecting against alterations or destruction. Privacy schemes maintain the right to control about the collected information for its usage and purpose. In this paper, we have surveyed major challenges such as Confidentiality, Integrity, Authentication, and Availability for IoT in a brief manner.
引用
收藏
页码:1667 / 1693
页数:27
相关论文
共 105 条
[1]  
Akanksha T, 2020, J FUTURE GENERATION, V108, p909
[2]   THE INTERNET OF BIO-NANOTHINGS [J].
Akyildiz, I. F. ;
Pierobon, M. ;
Balasubramaniam, S. ;
Koucheryavy, Y. .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 :32-40
[3]   THE INTERNET OF NANO-THINGS [J].
Akyildiz, Ian F. ;
Jornet, Josep Miquel .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (06) :58-63
[4]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[5]   Trust models of internet of smart things: A survey, open issues, and future directions [J].
Altaf, Ayesha ;
Abbas, Haider ;
Iqbal, Faiza ;
Derhab, Abdelouahid .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 137 :93-111
[6]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[7]  
Andrea L., 2017, IEEE INT WORKSH SMAR, P180
[8]  
[Anonymous], 2017, INTERNET THINGS DATA
[9]  
[Anonymous], 2017, MATH PROBL ENG, DOI [10.1155/2017/3578702, DOI 10.1155/2017/3578702]
[10]  
[Anonymous], 2016, INT C SIGN PROC COMM