Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions

被引:16
作者
Abbasi, Mahmoud [1 ]
Plaza-Hernandez, Marta [1 ]
Prieto, Javier [1 ]
Corchado, Juan M. [1 ,2 ,3 ]
机构
[1] Univ Salamanca, BISITE Res Grp, Edificio Multiusos I D I, Salamanca 37007, Spain
[2] AIR Inst, IoT Digital Innovat Hub, Valladolid 47011, Spain
[3] Osaka Inst Technol, Fac Engn, Dept Elect Informat & Commun, Osaka 5358585, Japan
基金
欧盟地平线“2020”;
关键词
Internet of Things; Complexity theory; Privacy; Smart grids; Computer security; Communication systems; Business; Threat assessment; security; privacy; requirements; taxonomy; PRESERVING COMMUNICATION PROTOCOL; INDUSTRIAL INTERNET; IOT SECURITY; SMART AGRICULTURE; ACCESS-CONTROL; PRIVACY; LIGHTWEIGHT; CHALLENGES; AUTHENTICATION; ATTACKS;
D O I
10.1109/ACCESS.2022.3205351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Communication systems and networks are evolving as an integral part of not only of our everyday life but also as a part of the industry, fundamental infrastructures, companies, etc. Current directions and concepts, such as the Internet of Things (IoT), promise the enhanced quality of life, greater business opportunities, cost-effective manufacturing, and efficient operation management through ubiquitous connectivity and deployment of smart physical objects. IoT networks can collect, preprocess, and transmit vast amounts of data. A considerable portion of this data is security- and privacy-critical data, which makes IoT networks a tempting option for attackers. Given that these networks deal with the actual aspects of our lives and fundamental infrastructures (e.g. smart grids), security in such networks is crucial. The large scale of these networks and their unique characteristics and complexity bring further vulnerabilities. In this study, we focus on the IoT application layer, security requirements, threats, and countermeasures in this layer, and some of the open issues and future research lines.
引用
收藏
页码:97197 / 97216
页数:20
相关论文
共 166 条
[21]  
Armknecht F., 2007, PROC COMMUN DISTRIB, P1
[22]  
Asim M., 2017, 2017 7 INT S EMB COM, V8, P996
[23]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[24]   Cyber resilience protection for industrial internet of things: A software-defined networking approach [J].
Babiceanu, Radu F. ;
Seker, Remzi .
COMPUTERS IN INDUSTRY, 2019, 104 :47-58
[25]  
Balamurugan B, 2017, ADV INF SECUR PRIV, P46, DOI 10.4018/978-1-5225-2296-6.ch003
[26]  
Bariah L., 2015, Recent advances in VANET security: a survey, P1, DOI DOI 10.1109/VTCFALL.2015.7391111
[27]  
Behzadan V, 2017, Arxiv, DOI arXiv:1709.04137
[28]   Blockchain for smart cities: A review of architectures, integration trends and future research directions [J].
Bhushan, Bharat ;
Khamparia, Aditya ;
Sagayam, K. Martin ;
Sharma, Sudhir Kumar ;
Ahad, Mohd Abdul ;
Debnath, Narayan C. .
SUSTAINABLE CITIES AND SOCIETY, 2020, 61
[29]   A Comprehensive Survey on Certificateless Aggregate Signature in Vehicular Ad Hoc Networks [J].
Cahyadi, Eko Fajar ;
Hwang, Min-Shiang .
IETE TECHNICAL REVIEW, 2022, 39 (06) :1265-1276
[30]  
Canito Alda, 2020, 2020 IEEE 6th International Conference on Computer and Communications (ICCC), P553, DOI 10.1109/ICCC51575.2020.9345163