A Review of Security in Internet of Things

被引:48
作者
Harbi, Yasmine [1 ]
Aliouat, Zibouda [1 ]
Harous, Saad [2 ]
Bentaleb, Abdelhak [3 ]
Refoufi, Allaoua [1 ]
机构
[1] Ferhat Abbas Univ Setif1, LRSD Lab, Setif, Algeria
[2] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[3] Natl Univ Singapore, Sch Comp, Comp Sci, Singapore, Singapore
关键词
IoT; Smart life; Cyber-attacks; Security; Privacy; IOT APPLICATIONS; CHALLENGES; ATTACKS; PROTOCOL; PRIVACY; MANAGEMENT; ISSUES;
D O I
10.1007/s11277-019-06405-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) has drawn significant attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. These diverse application domains can be unified into a single entity referred as smart life. The rapid evolution of the IoT has pushed a race between cyber-criminals and security experts. As billions of connected things communicate with each other and can exchange sensitive information that may be leaked. Hence, strengthening IoT's security and preserving users' privacy is a major challenge. This paper aims to provide a comprehensive study of the IoT security. Several IoT security attacks are analyzed, and a taxonomy of the security requirements based on the attacks' purposes is proposed. Moreover, recent security solutions are described and classified based on their application domains. Finally, open research directions and security challenges are discussed.
引用
收藏
页码:325 / 344
页数:20
相关论文
共 98 条
[1]  
Abyaneh M.Z., 2012, THESIS
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]   Interoperability of Security-Enabled Internet of Things [J].
Alam, Sarfraz ;
Chowdhury, Mohammad M. R. ;
Noll, Josef .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) :567-586
[5]  
Alsaadi E., 2015, International Journal of Advanced Computer Science and Information Technology (IJACSIT), V4, P1
[6]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[7]  
[Anonymous], 2013, INT J ADV COMP RES
[8]  
[Anonymous], 2015 IEEE ACS 12 INT
[9]  
[Anonymous], 2009, ARXIV09111681
[10]  
[Anonymous], 2015, IACR CRYPTOLOGY EPRI