Research Article

A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions

by  Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Issue 16
Published: April 2024
Authors: Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama
10.5120/ijca2024923543
PDF

Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama . A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions. International Journal of Computer Applications. 186, 16 (April 2024), 14-19. DOI=10.5120/ijca2024923543

                        @article{ 10.5120/ijca2024923543,
                        author  = { Ghadi Shaheen,Fatmah Alahmadi,Amjad Alsulami,Shaimaa Salama },
                        title   = { A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions },
                        journal = { International Journal of Computer Applications },
                        year    = { 2024 },
                        volume  = { 186 },
                        number  = { 16 },
                        pages   = { 14-19 },
                        doi     = { 10.5120/ijca2024923543 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2024
                        %A Ghadi Shaheen
                        %A Fatmah Alahmadi
                        %A Amjad Alsulami
                        %A Shaimaa Salama
                        %T A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions%T 
                        %J International Journal of Computer Applications
                        %V 186
                        %N 16
                        %P 14-19
                        %R 10.5120/ijca2024923543
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Things (IoT) technologies have expanded in diverse domains to create smart environments. According to the distribution of IoT, security aspects must be concerned and improved. The IoT uses different kinds of technologies to produce results. Therefore, it presents new different challenges and issues in security. Several researchers have examined various security issues, threats, challenges, and solutions to increase security in IoT devices. This survey paper presents an introduction to IoT and its purposes. IoT includes three different layers of architecture classified as perception, network, and application layers. The security issues, threats, and challenges in each layer of IoT. The possible solutions to solve the IoT security issues. Moreover, a comparison between IT and IoT security.

References
  • Kevin Ashton, ”That ’Internet of Things Thing”, RFID Journal, 2009
  • Madakam, Somayya, et al. "Internet of Things (IoT): A literature review." Journal of Computer and Communications, 2015
  • B. Li and J. Yu, “Research and application on the smart home based on component technologies and internet of things,” Procedia Engineering, 2011.
  • Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., “Analysis of a key- establishment security protocol”, Journal of Computer Science and Control Systems, 2008.
  • Razzaq, Mirza Abdur, et al. "Security issues in the Internet of Things (IoT): A comprehensive study." International Journal of Advanced Computer Science and Applications, 2017
  • Ebraheim Alsaadi, and Abdallah Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities", International Journal of Advanced Computer Science and Information Technology, 2015
  • Ziegeldorf, Jan Henrik, Oscar Garcia Morchon, and Klaus Wehrle. "Privacy in the Internet of Things: threats and challenges." Security and Communication Networks, 2014
  • Vikas, B. O. "Internet of things (IoT): A survey on privacy issues and security." International Journal of Scientific Research in Science,
  • Engineering and Technology, 2015
  • Joshitta, R. Shantha Mary, and L. Arockiam. "Security in IoT environment: a survey." International Journal of Information Technology and Mechanical Engineering, 2016
  • Lin, Jie, et al. "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications." IEEE internet of things journal , 2017
  • Mahmoud, Rwan, et al. "Internet of things (IoT) security: Current status, challenges and prospective measures." 2015 10th international conference for internet technology and secured transactions (ICITST).
  • IEEE, 2015
  • Neshenko, Nataliia, et al. "Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet- scale IoT exploitations." IEEE Communications Surveys & Tutorials, 2019
  • M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)," Perception, 2015
  • Sarker, Iqbal H., et al. "Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions." Mobile Networks and Applications, 2022
  • Daniele Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, "Internet of Things: Vision, applications and research challenges", Ad Hoc Networks, 2012
  • Md Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", SERVICES, 2015, IEEE World Congress on. IEEE, 2015.
  • Sicari, Sabrina, et al. "Dynamic policies in internet of things: enforcement and synchronization." IEEE Internet of Things Journal, 2017
  • Seyum Wolde, Mehir, and Adeel Hussain. "Password Security Assessment of IoT-Devices." 2022
  • Wang, C. . “Understanding node capture attacks in user authentication schemes for Wireless Sensor Networks,” IEEE Transactions on Dependable and Secure Computing, 2022
  • Damghani, H. “Classification of Attacks on IoT,” In 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 2019.
  • Jurcut, A., Ranaweera, P. and Xu, L. (2020) “Introduction to IoT Security.”
  • Williams, P. “A survey on security in internet of things with a focus on the impact of emerging technologies,” Internet of Things, 2022
  • Pirretti, M. “The sleep deprivation attack in sensor networks: Analysis and Methods of Defense,” International Journal of Distributed Sensor Networks, 2006
  • Hassija, V. “A survey on IOT security: Application areas, security threats, and solution architectures,” IEEE Access, 2019
  • Anand, P. “IOT vulnerability assessment for sustainable computing:
  • Threats, current solutions, and open challenges,” IEEE Access, 2020
  • Abughazaleh, N. “DOS attacks in IOT Systems and proposed solutions,” International Journal of Computer Applications, 2020
  • Aliyu, F., Sheltami, T. and Shakshuki, E.M. “A detection and prevention technique for man in the middle attack in fog computing,”
  • Procedia Computer Science, 2018
  • C. Ioannou and V. Vassiliou, “Accurate detection of sinkhole attacks in IOT networks using local agents,” 2020 Mediterranean Communication and Computer Networking Conference (MedComNet), 2020.
  • I. Ahmad, M. Niazy, R. Ziar, and S. Khan, “Survey on IoT: Security Threats and Applications ,” Journal of Robotics and Control, 2021.
  • K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber threats to industrial IOT: A survey on attacks and countermeasures,” IoT, 2021
  • S. G. Abbas, I. Vaccari, F. Hussain, S. Zahid, U. U. Fayyaz, G. A. Shah, T. Bakhshi, and E. Cambiaso, “Identifying and mitigating phishing attack threats in IOT use cases using a threat modelling approach,” Sensors, 2021.
  • M. Shobana and S. Rathi, “IOT Malware : An Analysis of IOT Device Hijacking,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2018.
  • T. Aziz and E.-ul Haq, “Security challenges facing IOT layers and its protective measures,” International Journal of Computer Applications, 2018.
  • B. Prabadevi and N. Jeyanthi, “A Review on Various Sniffing Attacks and its Mitigation Techniques,” Indonesian Journal of Electrical Engineering and Computer Scienc, 2018.
  • Qu, Jia. “Research on password detection technology of IOT equipment based on Wide Area Network”. In: ICT Express ,2022
  • S. Sicari, C. Cappiello, F. D. Pellegrini, D. Miorandi, and A. Coen- Porisini, “A security-and quality-aware system architecture for internet of things,” Information Systems Frontiers,2014.
  • I. K. Dutta, B. Ghosh, and M. Bayoumi, “Lightweight cryptography for internet of insecure things: A survey,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019.
  • Katagi, Masanobu, and Shiho Moriai. "Lightweight cryptography for the internet of things." sony corporation 2008.
  • Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 2020
  • Dos Santos, Giederson Lessa, et al. "A DTLS-based security architecture for the Internet of Things." 2015 IEEE symposium on computers and communication (ISCC). IEEE, 2015.
  • Kothmayr, Thomas, et al. "DTLS based security and two-way authentication for the Internet of Things." Ad Hoc Networks, 2013
  • D. Singh, P. Singh, M. Mishra, A. Lamba, and S. Swagatik, “Security Issues In Different Layers Of IoT And Their Possible Mitigation,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 2020.
  • Chakrabarti, A., & Manimaran, G. Internet infrastructure security: A taxonomy. IEEE network, 2002
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Internet of Things IoT security Security Solutions Lightweight Cryptography NOS

Powered by PhDFocusTM