Internet of things security: A top-down survey

被引:316
作者
Kouicem, Djamel Eddine [1 ]
Bouabdallah, Abdelmadjid [1 ]
Lakhlef, Hicham [1 ]
机构
[1] Sorbonne Univ, Univ Technol Compiegne, CNRS, HEUDIASYC UMR 7253, CS 60319, F-60203 Compiegne, France
关键词
Internet of Things; Security; Privacy; Cryptography; Blockchain; Software defined networking; ACCESS-CONTROL; SENSOR NETWORKS; K-ANONYMITY; PRIVACY; SCHEME; SAFETY; CHALLENGES; TRUST; AUTHENTICATION; ENCRYPTION;
D O I
10.1016/j.comnet.2018.03.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims to integrate seamlessly both physical and digital worlds in one single ecosystem that makes up a new intelligent era of Internet. This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. However, as new emergent technology, IoT suffers from several security issues which are most challenging than those from other fields regarding its complex environment and resources-constrained IoT devices. A lot of researches have been initiated in order to provide efficient security solutions in IoT, particularly to address resources constraints and scalability issues. Furthermore, some technologies related to networking and cryptocurrency fields such as Software Defined Networking (SDN) and Blockchain are, revolutionizing the world of the Internet of Things thanks to their efficiency and scalability. In this paper, we provide a comprehensive top down survey of the most recent proposed security and privacy solutions in IoT. We discuss particularly the benefits that new approaches such as blockchain and Software Defined Networking can bring to the security and the privacy in IoT in terms of flexibility and scalability. Finally, we give a general classification of existing solutions and comparison based on important parameters. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:199 / 221
页数:23
相关论文
共 140 条
[1]  
Abdel-Aziz MM, 2016, INT C MICROELECTRON, P273, DOI 10.1109/ICM.2016.7847868
[2]   Location-enhanced Authentication using the IoT Because You Cannot Be in Two Places at Once [J].
Agadakos, Ioannis ;
Hallgren, Per ;
Damopoulos, Dimitrios ;
Sabelfeld, Andrei ;
Portokalidis, Georgios .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :251-264
[3]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[4]  
Alanazi S, 2015, 2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), P205, DOI 10.1109/HealthCom.2015.7454499
[5]   Anonymous authentication for privacy-preserving IoT target-driven applications [J].
Alcaide, Almudena ;
Palomar, Esther ;
Montero-Castillo, Jose ;
Ribagorda, Arturo .
COMPUTERS & SECURITY, 2013, 37 :111-123
[6]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[7]  
[Anonymous], 2014, INT J COMPUT APPL
[8]  
[Anonymous], 2014, J. Adv. Comput. Sci. Technol., DOI DOI 10.14419/JACST.V3I2.3321
[9]  
[Anonymous], INF TECHNOL
[10]  
[Anonymous], 8 EUR C EMB REAL TIM