Internet of Things Security Techniques: a Survey

被引:2
作者
Alturfi, Sabah M. [1 ]
Marhoon, Haydar Abdulameer [2 ]
Al-Musawi, Bahaa [3 ]
机构
[1] Univ Kerbala, Coll Law, Karbala, Iraq
[2] Univ Kerbala, Coll Sci, Commputer Sci Dept, Karbala, Iraq
[3] Univ Kula, Fac Engn, Al Najaf, Iraq
来源
8TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2020) | 2020年 / 2290卷
关键词
IoT Security; Sensors; Actuators; WSN; DDoS; IOT; FRAMEWORK; SMART;
D O I
10.1063/5.0027358
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid growth of Internet technologies, Internet of Things (IoT) devices have become widely required. A huge number of smart devices around the world containing sensors and actuators are collecting data and processing it to perform specific actions. As these services deployed via the Internet, it becomes an easy target to the vulnerabilities. The defenses against these threats need to maximize and ensure high security to maintain the confidentiality, availability, and integrity of IoT resources. Different techniques and approaches have been proposed and established to protect smart devices and data from attacks. This survey uses the five layers architecture to explore different types of threats and vulnerabilities at an individual layer of IoT architecture. It also reviews different types of techniques and, approaches and methods to secure IoT architecture.
引用
收藏
页数:10
相关论文
共 38 条
[1]   RETRACTED: Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems (Retracted article. See vol. 128, pg. 568, 2022) [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Mohamed, Mai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :614-628
[2]  
Ahemd MM, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), P104, DOI 10.1109/COMTECH.2017.8065757
[3]  
AL-Musawi B.Q, 2012, PREVENTING BRUTE FOR, V53, P663
[4]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[5]  
Aldosari H., 2016, NOVEL SECURITY LAYER, V8, P275
[6]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[7]  
[Anonymous], 2018, A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
[8]  
[Anonymous], 2016, 2016 INT MULT C COMP
[9]   COLIDE: a collaborative intrusion detection framework for Internet of Things [J].
Arshad, Junaid ;
Azad, Muhammad Ajmal ;
Abdellatif, Mohammad Mahmoud ;
Rehman, Muhammad Habib Ur ;
Salah, Khaled .
IET NETWORKS, 2019, 8 (01) :3-14
[10]   The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo ;
Nitti, Michele .
COMPUTER NETWORKS, 2012, 56 (16) :3594-3608