Security in product lifecycle of IoT devices: A survey

被引:53
作者
Yousefnezhad, Narges [1 ]
Malhi, Avleen [1 ]
Framling, Kary [2 ]
机构
[1] Aalto Univ, Dept Comp Sci, Espoo, Finland
[2] Umea Univ, Dept Comp Sci, Umea, Sweden
基金
芬兰科学院;
关键词
Internet of things; Product lifecycle; Lifecycle phases; Security solutions; Product lifecycle security; Device security; ACCESS-CONTROL; INTRUSION DETECTION; THINGS IOT; MANAGEMENT SCHEME; TRUST MANAGEMENT; FUTURE INTERNET; OF-THINGS; LIGHTWEIGHT; CHALLENGES; CLOUD;
D O I
10.1016/j.jnca.2020.102779
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is considerably impacted by security challenges, which has lately demanded substantial consideration. Accordingly, certain reviews and surveys have been presented, focusing on disparate IoT-related domains, including IoT security, intrusion detection systems, and emerging technologies. However, in this article, we solely target IoT security with respect to product lifecycle stages. In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security. Further, we present prominent solutions for addressing product lifecycle security in IoT. In this context, the contributions of this article are: (a) IoT product lifecycle security, (b) security taxonomy in IoT product lifecycle, (c) security solutions for each lifecycle phase in product lifecycle stages, and (d) open issues in these lifecycle stages that pose new research challenges. Consequently, the advancing research related to IoT security, especially with respect to product lifecycle, is explored through state-of-the-art developments in the domain of product lifecycle security.
引用
收藏
页数:40
相关论文
共 272 条
  • [1] A Mechanism for Securing IoT-enabled Applications at the Fog Layer
    Abbas, Nadeem
    Asim, Muhammad
    Tariq, Noshina
    Baker, Thar
    Abbas, Sohail
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
  • [2] A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK)
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    Romdhani, Imed
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1110 - 1118
  • [3] INVITED Things, Trouble, Trust: On Building Trust in IoT Systems
    Abera, Tigist
    Asokan, N.
    Davi, Lucas
    Koushanfar, Farinaz
    Paverd, Andrew
    Sadeghi, Ahmad-Reza
    Tsudik, Gene
    [J]. 2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [4] Abomhara M, 2014, 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS)
  • [5] LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Peris-Lopez, Pedro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 410 - 424
  • [6] Partial Solvers for Parity Games: Effective Polynomial-Time Composition
    Ah-Fat, Patrick
    Huth, Michael
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (226): : 1 - 15
  • [7] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [8] Confidential smart-sensing framework in the IoT era
    Al-Turjman, Fadi
    Alturjman, Sinem
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (10) : 5187 - 5198
  • [9] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [10] Anonymous authentication for privacy-preserving IoT target-driven applications
    Alcaide, Almudena
    Palomar, Esther
    Montero-Castillo, Jose
    Ribagorda, Arturo
    [J]. COMPUTERS & SECURITY, 2013, 37 : 111 - 123