A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

被引:647
作者
Hassija, Vikas [1 ]
Chamola, Vinay [2 ]
Saxena, Vikas [1 ]
Jain, Divyansh [1 ]
Goyal, Pranav [1 ]
Sikdar, Biplab [3 ]
机构
[1] Jaypee Inst Informat Technol, Dept CSE&IT, Noida 201309, India
[2] BITS, Dept EEE, Pilani 333031, Rajasthan, India
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); IoT security; blockchain; fog computing; edge computing; machine learning; IoT applications; distributed systems; COMPUTING PARADIGM; AGGREGATION SCHEME; INTERNET; PRIVACY; BLOCKCHAIN; EDGE; CLOUD; THINGS; MANAGEMENT; AUTHENTICATION;
D O I
10.1109/ACCESS.2019.2924045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an evergrowing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
引用
收藏
页码:82721 / 82743
页数:23
相关论文
共 184 条
  • [81] Kulkarni Raghavendra V., 2009, Proceedings 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), P1680, DOI 10.1109/IJCNN.2009.5179075
  • [82] Kumar J, 2017, 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), P36, DOI 10.1109/PKIA.2017.8278958
  • [83] Kumar M., HACK WIFI PASSWORD S
  • [84] Security Enhancements to System on Chip Devices for IoT Perception Layer
    Kumar, Sudeendra K.
    Sahoo, Sauvagya
    Mahapatra, Abhishek
    Swain, Ayas Kanta
    Mahapatra, K. K.
    [J]. 2017 3RD IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS (INIS), 2017, : 151 - 156
  • [85] Laplante PA, 2018, IT PROF, V20, P15
  • [86] Time-bound key-aggregate encryption for cloud storage
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chiu, Shih-Ting
    Chen, Shun-Der
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2059 - 2069
  • [87] Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
    Lei, Ao
    Cruickshank, Haitham
    Cao, Yue
    Asuquo, Philip
    Ogah, Chibueze P. Anyigor
    Sun, Zhili
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1832 - 1843
  • [88] Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks
    Li, Cheng
    Qin, Zhengrui
    Novak, Ed
    Li, Qun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1156 - 1164
  • [89] Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
    Li, Lichun
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    Datta, Anwitaman
    Shao, Jun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1847 - 1861
  • [90] An energy-aware Edge Server Placement Algorithm in Mobile Edge Computing
    Li, Yuanzhe
    Wang, Shangguang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2018, : 66 - 73