(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-7 Issue-26 April-2022
Full-Text PDF
Paper Title : A survey on IoT security: application areas, security threats, and solution architectures
Author Name : Animesh Kumar Dubey
Abstract :

IoT technology play a significant role in securely managing the interaction between devices. Objects may be empowered to receive, create, transfer and exchange information in a hassle-free manner by using Internet of Things (IoT). The upcoming and existing applications of IoT are really promising to enhance the level of efficiency, automation, and comfort for users. This research work sheds light on discussing why security is important in IoT devices in recent times. Additionally, a detailed explanation of the challenges related to security and the origin of threats in the IoT application is discussed in this research. After analysing the security issues, various existing and emerging technologies concentrated on achieving a high level of trust in the application of IoT are presented in this study. There are four different technologies such as fog computing, blockchain, edge computing and machine learning to increase the security level in IoT that are also discussed in this research paper.

Keywords : IoT technology, Security, Emerging technologies, Machine learning.
Cite this article : Dubey AK. A survey on IoT security: application areas, security threats, and solution architectures. ACCENTS Transactions on Information Security. 2022; 7 (26): 9-16. DOI:10.19101/TIS.2022.725001.
References :
[1]Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019; 7:82721-43.
[Google Scholar]
[2]Altulaihan E, Almaiah MA, Aljughaiman A. Cybersecurity threats, countermeasures and mitigation techniques on the iot: future research directions. Electronics. 2022; 11(20):1-41.
[Crossref] [Google Scholar]
[3]Tabaa M, Monteiro F, Bensag H, Dandache A. Green industrial internet of things from a smart industry perspectives. Energy Reports. 2020; 6:430-46.
[Crossref] [Google Scholar]
[4]Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022; 10:40281-306.
[Crossref] [Google Scholar]
[5]Reddy YH, Ali A, Kumar PV, Srinivas MH, Netra K, Achari VJ, et al. A comprehensive survey of internet of things applications, threats, and security issues. South Asian Research Journal of Engineering and Technology. 2022; 4(4):63-77.
[Google Scholar]
[6]Tariq N, Asim M, Al-Obeidat F, Zubair Farooqi M, Baker T, Hammoudeh M, et al. The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors. 2019; 19(8):1-33.
[Crossref] [Google Scholar]
[7]Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials. 2019; 21(3):2702-33.
[Crossref] [Google Scholar]
[8]Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and security: challenges and solutions. Applied Sciences. 2020; 10(12):1-17.
[Crossref] [Google Scholar]
[9]https://www.statista.com/statistics/1321250/worldwide-internet-of-things-attacks/. Accessed 12th March 2022.
[10]Sahu D, Pradhan B, Khasnobish A, Verma S, Kim D, Pal K. The internet of things in geriatric healthcare. Journal of Healthcare Engineering. 2021; 2021:1-16.
[Crossref] [Google Scholar]
[11]Al-Khafajiy M, Baker T, Chalmers C, Asim M, Kolivand H, Fahim M, Waraich A. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications. 2019; 78(17):24681-706.
[Crossref] [Google Scholar]
[12]Hamid UZ, Zamzuri H, Limbu DK. Internet of vehicle (IoV) applications in expediting the implementation of smart highway of autonomous vehicle: a survey. Performability in Internet of Things. 2019:137-57.
[Crossref] [Google Scholar]
[13]Alkinani MH, Almazroi AA, Jhanjhi NZ, Khan NA. 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors. 2021; 21(20):1-16.
[Crossref] [Google Scholar]
[14]Hussain F, Hussain R, Hassan SA, Hossain E. Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials. 2020; 22(3):1686-721.
[Crossref] [Google Scholar]
[15]Hughes-Lartey K, Li M, Botchey FE, Qin Z. Human factor, a critical weak point in the information security of an organizations Internet of things. Heliyon. 2021; 7(3):e06522.
[Crossref] [Google Scholar]
[16]Li R, Song T, Mei B, Li H, Cheng X, Sun L. Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing. 2018; 12(5):762-71.
[Crossref] [Google Scholar]
[17]Chowdhury MZ, Shahjalal M, Hasan MK, Jang YM. The role of optical wireless communication technologies in 5G/6G and IoT solutions: prospects, directions, and challenges. Applied Sciences. 2019; 9(20):1-20.
[Crossref] [Google Scholar]
[18]Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H. An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Communications and Networks. 2023; 9(1):101-10.
[Crossref] [Google Scholar]
[19]Chanal PM, Kakkasageri MS. Security and privacy in IOT: a survey. Wireless Personal Communications. 2020; 115:1667-93.
[Crossref] [Google Scholar]
[20]Kotsiopoulos T, Sarigiannidis P, Ioannidis D, Tzovaras D. Machine learning and deep learning in smart manufacturing: the smart grid paradigm. Computer Science Review. 2021.
[Crossref] [Google Scholar]
[21]Gunduz MZ, Das R. Cyber-security on smart grid: threats and potential solutions. Computer networks. 2020; 169:107094.
[Crossref] [Google Scholar]
[22]Kumar R, Sharma R. Leveraging blockchain for ensuring trust in IoT: a survey. Journal of King Saud University-Computer and Information Sciences. 2022; 34(10):8599-622.
[Crossref] [Google Scholar]
[23]Pop P, Zarrin B, Barzegaran M, Schulte S, Punnekkat S, Ruh J, Steiner W. The FORA fog computing platform for industrial IoT. Information Systems. 2021; 98:101727.
[Crossref] [Google Scholar]
[24]Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A. A survey of security and privacy issues in the Internet of Things from the layered context. Transactions on Emerging Telecommunications Technologies. 2022; 33(6).
[Crossref] [Google Scholar]
[25]Arisdakessian S, Wahab OA, Mourad A, Otrok H, Guizani M. A survey on iot intrusion detection: Federated learning, game theory, social psychology and explainable ai as future directions. IEEE Internet of Things Journal. 2022.
[Crossref] [Google Scholar]
[26]Aristidou C, Marcou E. Blockchain standards and government applications. Journal of ICT Standardization. 2019: 287-312.
[Crossref] [Google Scholar]
[27]Rani S, Kataria A, Sharma V, Ghosh S, Karar V, Lee K, Choi C. Threats and corrective measures for IoT security with observance of cybercrime: a survey. Wireless Communications and Mobile Computing. 2021; 2021:1-30.
[Crossref] [Google Scholar]
[28]Roy S, Ashaduzzaman M, Hassan M, Chowdhury AR. Blockchain for IoT security and management: Current prospects, challenges and future directions. In 5th international conference on networking, systems and security (NSysS) 2018 (pp. 1-9). IEEE.
[Crossref] [Google Scholar]
[29]Mohanta BK, Jena D, Satapathy U, Patnaik S. Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things. 2020.
[Crossref] [Google Scholar]
[30]Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D. Decauth: decentralized authentication scheme for iot device using ethereum blockchain. In TENCON 2019-2019 IEEE region 10 conference (TENCON) 2019 (pp. 558-63). IEEE.
[Crossref] [Google Scholar]
[31]Aman AH, Yadegaridehkordi E, Attarbashi ZS, Hassan R, Park YJ. A survey on trend and classification of internet of things reviews. IEEE Access. 2020; 8:111763-82.
[Crossref] [Google Scholar]
[32]Khanam S, Ahmedy IB, Idris MY, Jaward MH, Sabri AQ. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. 2020; 8:219709-43.
[Crossref] [Google Scholar]
[33]Fahim M, Sillitti A. Anomaly detection, analysis and prediction techniques in iot environment: a systematic literature review. IEEE Access. 2019; 7:81664-81.
[Crossref] [Google Scholar]
[34]Mishra B, Kertesz A. The use of MQTT in M2M and IoT systems: a survey. IEEE Access. 2020; 8:201071-86.
[Crossref] [Google Scholar]