A Survey on Internet of Things: Applications, Recent Issues, Attacks, and Security Mechanisms

被引:65
作者
Uganya, G. [1 ]
Radhika [1 ]
Vijayaraj, N. [2 ]
机构
[1] Saveetha Inst Med & Tech Sci, Saveetha Sch Engn, Dept Elect & Commun Engn, Chennai 602105, Tamil Nadu, India
[2] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Sch Comp, Dept Comp Sci & Engn, Chennai 600062, Tamil Nadu, India
关键词
Internet of Things; IoT applications; future trends; existing IoT system; security attacks; security mechanisms; issues and challenges; AUTHENTICATED KEY AGREEMENT; HEALTH-CARE; BLOCKCHAIN; IOT; SCHEME; MODEL; TRUST; ARCHITECTURE; EFFICIENT; PROTOCOL;
D O I
10.1142/S0218126621300063
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a series of recording devices, mechanical and automated machines, documents, creatures, or individuals that have one of the user identifiers and the ability to substitute information over a network without requiring human-to-human connections. The IoT technology is used in different applications to transfer information between two or more stations or devices using actuators/sensors. The IoT has many fields of application, including smart home, healthcare, transport and logistics, and industry. Each application gives highlights and important and explicit administrations. This paper provides an overview of IoT applications, discussing their current problems and potential challenges. In addition, it focuses on issues and challenges that arise for future IoT systems including enormous scaling, planning and needs, generating information and big data, strength, frankness, resource management, privacy, and security. The secure data transformation is more problematic in ongoing research. So, this survey presents security attacks and different security mechanisms involved in IoT applications including authentication, encryption, blockchain, and trust management. Blockchain with IoT applications provides good secure data transfer compared to other security mechanisms. So, this survey mainly concentrates on the blockchain with IoT applications and its latest issues. The objective of this paper is to analyze the issues and challenges of IoT applications, eight research topics in existing systems, security attacks and their countermeasures, and different security mechanisms confronting the IoT.
引用
收藏
页数:46
相关论文
共 124 条
[1]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[2]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[3]   Lightweight Encryption for Smart Home [J].
Al Salami, Sanaah ;
Baek, Joonsang ;
Salah, Khaled ;
Damiani, Ernesto .
PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, :382-388
[4]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[5]  
[Anonymous], 2004, P NETW DISTR SYST SE
[6]  
Ashibani Y, 2017, IEEE IPCCC
[7]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[8]   Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities [J].
Baker, Stephanie B. ;
Xiang, Wei ;
Atkinson, Ian .
IEEE ACCESS, 2017, 5 :26521-26544
[9]  
Banerjee A, 2017, IEEE INT CONF BIG DA, P4438, DOI 10.1109/BigData.2017.8258482
[10]  
Bao F, 2012, IEEE WOWMOM, P1, DOI [DOI 10.1109/WOWMOM.2012.6263792, DOI 10.1145/2378023.2378025]