State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

被引:36
作者
Krishna, Ritika Raj [1 ]
Priyadarshini, Aanchal [1 ]
Jha, Amitkumar V. [1 ]
Appasani, Bhargav [1 ]
Srinivasulu, Avireni [2 ]
Bizon, Nicu [3 ,4 ]
机构
[1] Kalinga Inst Ind Technol, Sch Elect Engn, Bhubaneswar 751024, India
[2] KR Mangalam Univ, Dept Elect & Commun Engn, Gurugram 122103, India
[3] Univ Pitesti, Fac Elect Commun & Comp, Pitesti 110040, Romania
[4] Univ Politehn Bucuresti, Doctoral Sch, 313 Splaiul Independentei, Bucharest 060042, Romania
关键词
Internet of Things; security; threats; privacy; vulnerabilities; Blockchain; INTRUSION DETECTION SYSTEMS; THINGS SECURITY; MOBILE EDGE; INTERNET; FOG; PRIVACY; BLOCKCHAIN; CLOUD; ARCHITECTURE; SERVICE;
D O I
10.3390/su13169463
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.
引用
收藏
页数:45
相关论文
共 228 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]  
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65
[3]   Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications [J].
Abosata, Nasr ;
Al-Rubaye, Saba ;
Inalhan, Gokhan ;
Emmanouilidis, Christos .
SENSORS, 2021, 21 (11)
[4]  
Accettura N, 2014, PROC IEEE INT SYMP, P1469, DOI 10.1109/ISIE.2014.6864831
[5]   An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges [J].
Adnan, Ahmed ;
Muhammed, Abdullah ;
Abd Ghani, Abdul Azim ;
Abdullah, Azizol ;
Hakim, Fahrul .
SYMMETRY-BASEL, 2021, 13 (06)
[6]   Feature Selection-Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning [J].
Ahmed, Saeed ;
Lee, Youngdo ;
Hyun, Seung-Ho ;
Koo, Insoo .
IEEE ACCESS, 2018, 6 :27518-27529
[7]   Energy Management-as-a-Service Over Fog Computing Platform [J].
Al Faruque, Mohammad Abdullah ;
Vatanparvar, Korosh .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02) :161-169
[8]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[9]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[10]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28