Enforcing security in Internet of Things frameworks: A Systematic Literature Review

被引:54
作者
Aly, Mohab [1 ,3 ]
Khomh, Foutse [1 ]
Haoues, Mohamed [2 ]
Quintero, Alejandro [2 ]
Yacout, Soumaya [3 ]
机构
[1] Polytech Montreal, SWAT lab, Montreal, PQ H3T IJ4, Canada
[2] Polytech Montreal, LARIM, Montreal, PQ H3T IJ4, Canada
[3] Polytech Montreal, MAGI, Montreal, PQ H3T IJ4, Canada
关键词
Internet of Things; Fog computing; Cloud computing; Security threats and vulnerabilities; Countermeasures; Systematic Literature Review; NAIVE BAYES CLASSIFIER; INTRUSION DETECTION; ANOMALY DETECTION; ATTACKS; IOT; CHALLENGES; PRIVACY; COUNTERMEASURES; PARADIGM; TAXONOMY;
D O I
10.1016/j.iot.2019.100050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors has increased significantly. It is anticipated that large-scale sensor-based systems will prevail in our societies, calling for novel methodologies to design and operate those new systems. To support the computational demand of real-time delay-sensitive applications of largely distributed IoT devices/sensors, the Cloud is migrating to the edge of the network where resources such as routers, switches, and gateways are being virtualized. The open structural design of IoT architecture and the extensive usage of the paradigm itself cause to encounter conventional security issues for the existing networking technologies. Moreover, cooperation generates challenges as new security challenges can disrupt the systems' regular functionalities and operations. Furthermore, the commercialization of the IoT has led to several public security concerns including threats of cyber-attacks, privacy issues, and organized crimes. In this paper, we aim to provide guidelines for researchers and practitioners interested in understanding IoT security issues. More specifically, an extensive description of security threats and challenges across the different layers of the architecture of IoT systems is presented. Also, the light will be shed on the solutions and countermeasures proposed in the literature to address such security issues. Finally, an emerging security challenge which has yet to be explained in-depth in previous studies is introduced. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:24
相关论文
共 184 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]  
Aguzzi S., 2013, Final Report, European Commission, SMART, V37, P2013
[4]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[5]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[6]   Deep Pain: Exploiting Long Short-Term Memory Networks for Facial Expression Classification [J].
Rodriguez, Pau ;
Cucurull, Guillem ;
Gonzalez, Jordi ;
Gonfaus, Josep M. ;
Nasrollahi, Kamal ;
Moeslund, Thomas B. ;
Roca, F. Xavier .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (05) :3314-3324
[7]   Multi-Tenancy in Cloud Computing [J].
AlJahdali, Hussain ;
Albatli, Abdulaziz ;
Garraghan, Peter ;
Townend, Paul ;
Lau, Lydia ;
Xu, Jie .
2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, :344-351
[8]  
Alliance C., 2011, Cloud Security Alliance, P15
[9]  
[Anonymous], 2010, document RFC 5826
[10]  
[Anonymous], 2014, Smart nest thermostat: A smart spy in your home