ACCENTS Transactions on Information Security (TIS) ISSN (P): 12222 ISSN (O): 2455-7196 Vol - 7, Issue - 26, April 2022
  1. 0
    Google Scholar
  2. 0
    Citation
  3. 0
    Impact Factor
A survey on IoT security: application areas, security threats, and solution architectures

Animesh Kumar Dubey

Abstract

IoT technology play a significant role in securely managing the interaction between devices. Objects may be empowered to receive, create, transfer and exchange information in a hassle-free manner by using Internet of Things (IoT). The upcoming and existing applications of IoT are really promising to enhance the level of efficiency, automation, and comfort for users. This research work sheds light on discussing why security is important in IoT devices in recent times. Additionally, a detailed explanation of the challenges related to security and the origin of threats in the IoT application is discussed in this research. After analysing the security issues, various existing and emerging technologies concentrated on achieving a high level of trust in the application of IoT are presented in this study. There are four different technologies such as fog computing, blockchain, edge computing and machine learning to increase the security level in IoT that are also discussed in this research paper.

Keyword

IoT technology, Security, Emerging technologies, Machine learning.

Cite this article

Refference

[1][1]Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access. 2019; 7:82721-43.

[2][2]Altulaihan E, Almaiah MA, Aljughaiman A. Cybersecurity threats, countermeasures and mitigation techniques on the iot: future research directions. Electronics. 2022; 11(20):1-41.

[3][3]Tabaa M, Monteiro F, Bensag H, Dandache A. Green industrial internet of things from a smart industry perspectives. Energy Reports. 2020; 6:430-46.

[4][4]Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022; 10:40281-306.

[5][5]Reddy YH, Ali A, Kumar PV, Srinivas MH, Netra K, Achari VJ, et al. A comprehensive survey of internet of things applications, threats, and security issues. South Asian Research Journal of Engineering and Technology. 2022; 4(4):63-77.

[6][6]Tariq N, Asim M, Al-Obeidat F, Zubair Farooqi M, Baker T, Hammoudeh M, et al. The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors. 2019; 19(8):1-33.

[7][7]Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials. 2019; 21(3):2702-33.

[8][8]Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M. IoT Privacy and security: challenges and solutions. Applied Sciences. 2020; 10(12):1-17.

[9][9]https://www.statista.com/statistics/1321250/worldwide-internet-of-things-attacks/. Accessed 12th March 2022.

[10][10]Sahu D, Pradhan B, Khasnobish A, Verma S, Kim D, Pal K. The internet of things in geriatric healthcare. Journal of Healthcare Engineering. 2021; 2021:1-16.

[11][11]Al-Khafajiy M, Baker T, Chalmers C, Asim M, Kolivand H, Fahim M, Waraich A. Remote health monitoring of elderly through wearable sensors. Multimedia Tools and Applications. 2019; 78(17):24681-706.

[12][12]Hamid UZ, Zamzuri H, Limbu DK. Internet of vehicle (IoV) applications in expediting the implementation of smart highway of autonomous vehicle: a survey. Performability in Internet of Things. 2019:137-57.

[13][13]Alkinani MH, Almazroi AA, Jhanjhi NZ, Khan NA. 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors. 2021; 21(20):1-16.

[14][14]Hussain F, Hussain R, Hassan SA, Hossain E. Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials. 2020; 22(3):1686-721.

[15][15]Hughes-Lartey K, Li M, Botchey FE, Qin Z. Human factor, a critical weak point in the information security of an organizations Internet of things. Heliyon. 2021; 7(3):e06522.

[16][16]Li R, Song T, Mei B, Li H, Cheng X, Sun L. Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing. 2018; 12(5):762-71.

[17][17]Chowdhury MZ, Shahjalal M, Hasan MK, Jang YM. The role of optical wireless communication technologies in 5G/6G and IoT solutions: prospects, directions, and challenges. Applied Sciences. 2019; 9(20):1-20.

[18][18]Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H. An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Communications and Networks. 2023; 9(1):101-10.

[19][19]Chanal PM, Kakkasageri MS. Security and privacy in IOT: a survey. Wireless Personal Communications. 2020; 115:1667-93.

[20][20]Kotsiopoulos T, Sarigiannidis P, Ioannidis D, Tzovaras D. Machine learning and deep learning in smart manufacturing: the smart grid paradigm. Computer Science Review. 2021.

[21][21]Gunduz MZ, Das R. Cyber-security on smart grid: threats and potential solutions. Computer networks. 2020; 169:107094.

[22][22]Kumar R, Sharma R. Leveraging blockchain for ensuring trust in IoT: a survey. Journal of King Saud University-Computer and Information Sciences. 2022; 34(10):8599-622.

[23][23]Pop P, Zarrin B, Barzegaran M, Schulte S, Punnekkat S, Ruh J, Steiner W. The FORA fog computing platform for industrial IoT. Information Systems. 2021; 98:101727.

[24][24]Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A. A survey of security and privacy issues in the Internet of Things from the layered context. Transactions on Emerging Telecommunications Technologies. 2022; 33(6).

[25][25]Arisdakessian S, Wahab OA, Mourad A, Otrok H, Guizani M. A survey on iot intrusion detection: Federated learning, game theory, social psychology and explainable ai as future directions. IEEE Internet of Things Journal. 2022.

[26][26]Aristidou C, Marcou E. Blockchain standards and government applications. Journal of ICT Standardization. 2019: 287-312.

[27][27]Rani S, Kataria A, Sharma V, Ghosh S, Karar V, Lee K, Choi C. Threats and corrective measures for IoT security with observance of cybercrime: a survey. Wireless Communications and Mobile Computing. 2021; 2021:1-30.

[28][28]Roy S, Ashaduzzaman M, Hassan M, Chowdhury AR. Blockchain for IoT security and management: Current prospects, challenges and future directions. In 5th international conference on networking, systems and security (NSysS) 2018 (pp. 1-9). IEEE.

[29][29]Mohanta BK, Jena D, Satapathy U, Patnaik S. Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things. 2020.

[30][30]Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D. Decauth: decentralized authentication scheme for iot device using ethereum blockchain. In TENCON 2019-2019 IEEE region 10 conference (TENCON) 2019 (pp. 558-63). IEEE.

[31][31]Aman AH, Yadegaridehkordi E, Attarbashi ZS, Hassan R, Park YJ. A survey on trend and classification of internet of things reviews. IEEE Access. 2020; 8:111763-82.

[32][32]Khanam S, Ahmedy IB, Idris MY, Jaward MH, Sabri AQ. A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access. 2020; 8:219709-43.

[33][33]Fahim M, Sillitti A. Anomaly detection, analysis and prediction techniques in iot environment: a systematic literature review. IEEE Access. 2019; 7:81664-81.

[34][34]Mishra B, Kertesz A. The use of MQTT in M2M and IoT systems: a survey. IEEE Access. 2020; 8:201071-86.