State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

被引:36
作者
Krishna, Ritika Raj [1 ]
Priyadarshini, Aanchal [1 ]
Jha, Amitkumar V. [1 ]
Appasani, Bhargav [1 ]
Srinivasulu, Avireni [2 ]
Bizon, Nicu [3 ,4 ]
机构
[1] Kalinga Inst Ind Technol, Sch Elect Engn, Bhubaneswar 751024, India
[2] KR Mangalam Univ, Dept Elect & Commun Engn, Gurugram 122103, India
[3] Univ Pitesti, Fac Elect Commun & Comp, Pitesti 110040, Romania
[4] Univ Politehn Bucuresti, Doctoral Sch, 313 Splaiul Independentei, Bucharest 060042, Romania
关键词
Internet of Things; security; threats; privacy; vulnerabilities; Blockchain; INTRUSION DETECTION SYSTEMS; THINGS SECURITY; MOBILE EDGE; INTERNET; FOG; PRIVACY; BLOCKCHAIN; CLOUD; ARCHITECTURE; SERVICE;
D O I
10.3390/su13169463
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.
引用
收藏
页数:45
相关论文
共 228 条
[71]   A framework for automating security analysis of the internet of things [J].
Ge, Mengmeng ;
Hong, Jin B. ;
Guttmann, Walter ;
Kim, Dong Seong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 83 :12-27
[72]   IoT Technology Applications-Based Smart Cities: Research Analysis [J].
Gonzalez-Zamar, Mariana-Daniela ;
Abad-Segura, Emilio ;
Vazquez-Cano, Esteban ;
Lopez-Meneses, Eloy .
ELECTRONICS, 2020, 9 (08) :1-36
[73]   Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices [J].
Gope, Prosanta ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :580-589
[74]   Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues [J].
Granjal, Jorge ;
Monteiro, Edmundo ;
Silva, Jorge Sa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1294-1312
[75]  
Grover J., 2013, CSI transactions on ICT, V1, P261
[76]   Onboarding and Software Update Architecture for IoT Devices [J].
Gupta, Hemant ;
van Oorschot, Paul C. .
2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, :69-79
[77]   Intrusion detection systems in the Internet of things: A comprehensive investigation [J].
Hajiheidari, Somayye ;
Wakil, Karzan ;
Badri, Maryam ;
Navimipour, Nima Jafari .
COMPUTER NETWORKS, 2019, 160 :165-191
[78]   Linear SVM-Based Android Malware Detection for Reliable IoT Services [J].
Ham, Hyo-Sik ;
Kim, Hwan-Hee ;
Kim, Myung-Sup ;
Choi, Mi-Jung .
JOURNAL OF APPLIED MATHEMATICS, 2014,
[79]   Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies [J].
Hamad, Salma Abdalla ;
Sheng, Quan Z. ;
Zhang, Wei Emma ;
Nepal, Surya .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02) :1372-1391
[80]   Edge-Computing Architectures for Internet of Things Applications: A Survey [J].
Hamdan, Salam ;
Ayyash, Moussa ;
Almajali, Sufyan .
SENSORS, 2020, 20 (22) :1-52