Abstract

Internet of things (IoT) is leading a new digital age. IoT is regarded as the significant frontier that can improve almost all aspect of our lives. Currently, the IoT technology faces several challenges to academic researchers and industry practitioners, mainly that related with security of data. The objective of this study is to develop a prioritization-based taxonomy of the challenging factors that could hinders the security of IoT. By conducting the literature review and questionnaire survey studies 21 challenging factors were identified that are reported in existing literature and in real-world practices. Moreover, the identified challenging factors are mapped in the core domain of IoT (i.e. smart city, smart home, smart wearable’s and smart health care); and apply the fuzzy- AHP approach to rank the identified challenging factors with respect to their criticality for security of IoT technology. The application of fuzzy-AHP is novel in this research area as it is successfully applied in other domains of information technology to address the multi-criterion decision making problems. This study is contributing by providing a prioritization-based taxonomy of the IoT security challenging factors that could help the practitioners and research community to revise and develop the new strategies for the secure IoT.

Highlights

  • During the last decade, Internet of Things (IoT) has attracted intensive attention due to a wide range of applications in industrial, biomedical observation, agriculture, smart cities, environmental monitoring and other fields

  • These cities are integrated with information and communication technology (ICT) and various sensing devices in order to optimize the efficiency of smart city[58]

  • The results shows that C7 (Confidentiality, Integrity, Availability (CIA), 94%) is declared as the highest scored challenging factor for secure IoT

Read more

Summary

Introduction

Internet of Things (IoT) has attracted intensive attention due to a wide range of applications in industrial, biomedical observation, agriculture, smart cities, environmental monitoring and other fields. With the rapid growth of high-speed network, IoT devices can be deployed in any suitable environment because of their undeniable value in future generation technology[2]. Though these devices can be controlled remotely in order to achieve the anticipated functionality. Sicari et al [21] have identified researchers’ effort in order to address the confidentiality, privacy, access control and security with middleware for IoT systems. They discussed various trust management, authentication, privacy, data security, and network issues. Zhang et al [24] discussed the security vulnerabilities in IoT devices such as authentication and authorization, privacy, light weight cryptographic techniques

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.