A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

被引:647
作者
Hassija, Vikas [1 ]
Chamola, Vinay [2 ]
Saxena, Vikas [1 ]
Jain, Divyansh [1 ]
Goyal, Pranav [1 ]
Sikdar, Biplab [3 ]
机构
[1] Jaypee Inst Informat Technol, Dept CSE&IT, Noida 201309, India
[2] BITS, Dept EEE, Pilani 333031, Rajasthan, India
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); IoT security; blockchain; fog computing; edge computing; machine learning; IoT applications; distributed systems; COMPUTING PARADIGM; AGGREGATION SCHEME; INTERNET; PRIVACY; BLOCKCHAIN; EDGE; CLOUD; THINGS; MANAGEMENT; AUTHENTICATION;
D O I
10.1109/ACCESS.2019.2924045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an evergrowing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
引用
收藏
页码:82721 / 82743
页数:23
相关论文
共 184 条
  • [61] Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System
    Gu, Lin
    Zeng, Deze
    Guo, Song
    Barnawi, Ahmed
    Xiang, Yong
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (01) : 108 - 119
  • [62] Security in the Internet of Things Supported by Mobile Edge Computing
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) : 56 - 61
  • [63] He SQ, 2017, CHINA COMMUN, V14, P1, DOI 10.1109/CC.2017.8233646
  • [64] Blockchain Access Privacy: Challenges and Directions
    Henry, Ryan
    Herzberg, Amir
    Kate, Aniket
    [J]. IEEE SECURITY & PRIVACY, 2018, 16 (04) : 38 - 45
  • [65] Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
    Hu, Pengfei
    Ning, Huansheng
    Qiu, Tie
    Song, Houbing
    Wang, Yanna
    Yao, Xuanxia
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1143 - 1155
  • [66] Characterization of a novel GH36 α-galactosidase from Bacillus megaterium and its application in degradation of raffinose family oligosaccharides
    Huang, Yan
    Zhang, Han
    Ben, Peipei
    Duan, Yajuan
    Lu, Meiling
    Li, Zhoukun
    Cui, Zhongli
    [J]. INTERNATIONAL JOURNAL OF BIOLOGICAL MACROMOLECULES, 2018, 108 : 98 - 104
  • [67] Huh S, 2017, INT CONF ADV COMMUN, P464, DOI 10.23919/ICACT.2017.7890132
  • [68] Javaid U., 2019, P 2019 IEEE 89 VEH T, P1, DOI DOI 10.1109/VTCSPRING.2019.8746499
  • [69] Javaid U., 2018, P WORKSH CRYPT BLOCK, P71
  • [70] BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments
    Javaid, Uzair
    Aman, Muhammad Naveed
    Sikdar, Biplab
    [J]. BLOCKSYS'18: PROCEEDINGS OF THE 1ST BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2018, : 13 - 18