Internet of Things: Evolution and technologies from a security perspective

被引:85
作者
Ande, Ruth [1 ]
Adebisi, Bamidele [1 ]
Hammoudeh, Mohammad [2 ]
Saleem, Jibran [1 ]
机构
[1] Manchester Metropolitan Univ, Dept Engn, Manchester, Lancs, England
[2] Manchester Metropolitan Univ, Dept Comp & Math, Manchester, Lancs, England
关键词
IoT; Internet of Things; Security; Cyber security; Secure by Design; Next Generation Internet; Smart city; Sustainable city; Energy reduction; Building Energy Management Systems; OF-THE-ART; IOT; CHALLENGES; STANDARDS; TAXONOMY; FUTURE; CITIES;
D O I
10.1016/j.scs.2019.101728
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In recent years, IoT has developed into many areas of life including smart homes, smart cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and industrial machineries can now be part of the IoT ecosystem. IoT has redefined the management of critical and non-critical systems with the aim of making our lives more safe, efficient and comfortable. As a result, IoT technology is having a huge positive impact on our lives. However, in addition to these positives, IoT systems have also attracted negative attention from malicious users who aim to infiltrate weaknesses within IoT systems for their own gain, referred to as cyber security attacks. By creating an introduction to IoT, this paper seeks to highlight IoT cyber security vulnerabilities and mitigation techniques to the reader. The paper is suitable for developers, practitioners, and academics, particularly from fields such as computer networking, information or communication technology or electronics. The paper begins by introducing IoT as the culmination of two hundred years of evolution within communication technologies. Around 2014, IoT reached consumers, early products were mostly small closed IoT networks, followed by large networks such as smart cities, and continuing to evolve into Next Generation Internet; internet systems which incorporate human values. Following this evolutionary introduction, IoT architectures are compared and some of the technologies that are part of each architectural layer are introduced. Security threats within each architectural layer and some mitigation strategies are discussed, finally, the paper concludes with some future developments.
引用
收藏
页数:15
相关论文
共 117 条
[1]  
Aasebo T., 2017, WIRELESS TECHNOLOGY
[2]   INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Gani, Abdullah ;
Imran, Muhammad ;
Guizani, Mohsen .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :10-16
[3]  
Akkaya K, 2015, IEEE WIREL COMMUNN, P58, DOI 10.1109/WCNCW.2015.7122529
[4]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[5]  
Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
[6]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[7]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[8]  
Alizadeh M, 2012, INT ISC CONF INFO SE, P48, DOI 10.1109/ISCISC.2012.6408190
[9]  
Amaral LA, 2016, MODEL OPTIM SCI TECH, V8, P333, DOI 10.1007/978-3-319-30913-2_15
[10]  
ANDERSEN M., 2015, XRDS CROSSROADS ACM, V22, P40