Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions

被引:16
作者
Abbasi, Mahmoud [1 ]
Plaza-Hernandez, Marta [1 ]
Prieto, Javier [1 ]
Corchado, Juan M. [1 ,2 ,3 ]
机构
[1] Univ Salamanca, BISITE Res Grp, Edificio Multiusos I D I, Salamanca 37007, Spain
[2] AIR Inst, IoT Digital Innovat Hub, Valladolid 47011, Spain
[3] Osaka Inst Technol, Fac Engn, Dept Elect Informat & Commun, Osaka 5358585, Japan
基金
欧盟地平线“2020”;
关键词
Internet of Things; Complexity theory; Privacy; Smart grids; Computer security; Communication systems; Business; Threat assessment; security; privacy; requirements; taxonomy; PRESERVING COMMUNICATION PROTOCOL; INDUSTRIAL INTERNET; IOT SECURITY; SMART AGRICULTURE; ACCESS-CONTROL; PRIVACY; LIGHTWEIGHT; CHALLENGES; AUTHENTICATION; ATTACKS;
D O I
10.1109/ACCESS.2022.3205351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as the Internet of Things (IoT), promise the enhanced quality of life, greater business opportunities, cost-effective manufacturing, and efficient operation management through ubiquitous connectivity and deployment of smart physical objects. IoT networks can collect, preprocess, and transmit vast amounts of data. A considerable portion of this data is security- and privacy-critical data, which makes IoT networks a tempting option for attackers. Given that these networks deal with the actual aspects of our lives and fundamental infrastructures (e.g. smart grids), security in such networks is crucial. The large scale of these networks and their unique characteristics and complexity bring further vulnerabilities. In this study, we focus on the IoT application layer, security requirements, threats, and countermeasures in this layer, and some of the open issues and future research lines.
引用
收藏
页码:97197 / 97216
页数:20
相关论文
共 166 条
[1]  
Aarika K., 2020, Procedia Comput. Sci, V175, P591, DOI DOI 10.1016/J.PROCS.2020.07.085
[2]   Masquerading Attacks Detection in Mobile Ad Hoc Networks [J].
Abbas, Sohail ;
Faisal, Mohammad ;
Rahman, Haseeb Ur ;
Khan, Muhammad Zahid ;
Merabti, Madjid ;
Khan, Atta Ur Rehman .
IEEE ACCESS, 2018, 6 :55013-55025
[3]   Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey [J].
Abbasi, Mahmoud ;
Shahraki, Amin ;
Taherkordi, Amir .
COMPUTER COMMUNICATIONS, 2021, 170 :19-41
[4]   Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions [J].
Abdelmaboud, Abdelzahir ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Abaker, Mohammed ;
Eisa, Taiseer Abdalla Elfadil ;
Albasheer, Hashim ;
Ghorashi, Sara Abdelwahab ;
Karim, Faten Khalid .
ELECTRONICS, 2022, 11 (04)
[5]  
Agrawal N., 2022, Security perspective analysis of industrial cyber physical systems (i-cps): A decade -wide survey
[6]   State-of-the-art survey of artificial intelligent techniques for IoT security [J].
Ahanger, Tariq Ahamed ;
Aljumah, Abdullah ;
Atiquzzaman, Mohammed .
COMPUTER NETWORKS, 2022, 206
[7]  
Ahmad I., 2021, J. Robot. Control. (JRC), V2, P42, DOI [10.18196/jrc.2150, DOI 10.18196/JRC.2150]
[8]  
Ahmed S. M., 2020, Innovation in Health Informatics, Next Gen Tech Driven Personalized MedSmart Healthcare, P375, DOI DOI 10.1016/B978-0-12-819043-2.00016-2
[9]   Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey [J].
Ahvanooey, Milad Taleby ;
Zhu, Mark Xuefang ;
Li, Qianmu ;
Mazurczyk, Wojciech ;
Choo, Kim-Kwang Raymond ;
Gupta, Birij B. ;
Conti, Mauro .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) :7639-7663
[10]   Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN) [J].
Al Hayajneh, Abdullah ;
Bhuiyan, Md Zakirul Alam ;
McAndrew, Ian .
COMPUTERS, 2020, 9 (01)