Security in product lifecycle of IoT devices: A survey

被引:52
作者
Yousefnezhad, Narges [1 ]
Malhi, Avleen [1 ]
Framling, Kary [2 ]
机构
[1] Aalto Univ, Dept Comp Sci, Espoo, Finland
[2] Umea Univ, Dept Comp Sci, Umea, Sweden
基金
芬兰科学院;
关键词
Internet of things; Product lifecycle; Lifecycle phases; Security solutions; Product lifecycle security; Device security; ACCESS-CONTROL; INTRUSION DETECTION; THINGS IOT; MANAGEMENT SCHEME; TRUST MANAGEMENT; FUTURE INTERNET; OF-THINGS; LIGHTWEIGHT; CHALLENGES; CLOUD;
D O I
10.1016/j.jnca.2020.102779
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) paradigm is considerably impacted by security challenges, which has lately demanded substantial consideration. Accordingly, certain reviews and surveys have been presented, focusing on disparate IoT-related domains, including IoT security, intrusion detection systems, and emerging technologies. However, in this article, we solely target IoT security with respect to product lifecycle stages. In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security. Further, we present prominent solutions for addressing product lifecycle security in IoT. In this context, the contributions of this article are: (a) IoT product lifecycle security, (b) security taxonomy in IoT product lifecycle, (c) security solutions for each lifecycle phase in product lifecycle stages, and (d) open issues in these lifecycle stages that pose new research challenges. Consequently, the advancing research related to IoT security, especially with respect to product lifecycle, is explored through state-of-the-art developments in the domain of product lifecycle security.
引用
收藏
页数:40
相关论文
共 272 条
  • [61] Daubert J, 2015, IEEE INT CONF COMM, P2665, DOI 10.1109/ICCW.2015.7247581
  • [62] Devi GU., 2015, INDIAN J SCI TECHNOL, V8, DOI 10.17485/ijst/2015/v8i20/49253
  • [63] Trust Management Techniques for the Internet of Things: A Survey
    Din, Ikram Ud
    Guizani, Mohsen
    Kim, Byung-Seo
    Hassan, Suhaidi
    Khan, Muhammad Khurram
    [J]. IEEE ACCESS, 2019, 7 : 29763 - 29787
  • [64] A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT
    Ding, Sheng
    Cao, Jin
    Li, Chen
    Fan, Kai
    Li, Hui
    [J]. IEEE ACCESS, 2019, 7 : 38431 - 38441
  • [65] Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing
    Diro, Abebe Abeshu
    Chilamkurti, Naveen
    Kumar, Neeraj
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (05) : 848 - 858
  • [66] A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration
    Dizdarevic, Jasenka
    Carpio, Francisco
    Jukan, Admela
    Masip-Bruin, Xavi
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [67] Machine Learning DDoS Detection for Consumer Internet of Things Devices
    Doshi, Rohan
    Apthorpe, Noah
    Feamster, Nick
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 29 - 35
  • [68] Flexible Certificate Revocation List for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,
  • [69] Edwards Sam, 2016, RAPID NETW, V16
  • [70] Pervasive-Based Access Control Model for IoT Environments
    El Bouanani, Salim
    El Kiram, My Ahmed
    Achbarou, Omar
    Outchakoucht, Aissam
    [J]. IEEE ACCESS, 2019, 7 : 54575 - 54585