Abstract

The Internet of Things (IoT) has been widely used in every aspect of life. The rapid development of IoT technologies raises concerns regarding security and privacy. IoT security is a critical concern in the preservation of the privacy and reliability of users’ private information. The privacy concern becomes the biggest barrier to further usage of IoT technology. This paper presents a review of IoT application areas in smart cities, smart homes, and smart healthcare that leverage such techniques from the point of view of security and privacy and present relevant challenges. In addition, we present potential tools to ensure the security and preservation of privacy for IoT applications. Furthermore, a review of relevant research studies has been carried out and discusses the security of IoT infrastructure, the protocols, the challenges, and the solutions. Finally, we provide insight into challenges in the current research and recommendations for future works. The reviewed IoT applications have made life easier, but IoT devices that use unencrypted networks are increasingly coming under attack by malicious hackers. This leads to access to sensitive personal data. There is still time to protect devices better by pursuing security solutions with this technology. The results illustrate several technological and security challenges, such as malware, secure privacy management, and non-security infrastructure for cloud storage that still require effective solutions.

Highlights

  • The modern technological revolution has become an integral part of our lives

  • Protocols are important to define the spoken language of the Internet of Things (IoT) devices in terms of coordinating the messages exchanged between the linked devices, and to determine the correct limits that correspond to the different functions of each device

  • With HomeKit Accessory Protocol (HAP), lights, amplifiers, air conditioning, and other devices can connected to IoT and managed through a single interface that works with voice commands; as soon as a voice command like “Sleep” is issued, dim lighting will be turned on, turning off the TVs, and locking the doors of the house [15]

Read more

Summary

INTRODUCTION

Internet-enabled devices produce Internet crowding, as they contain large amounts of data that make the device useful This technology provides access to information in real-time; one example of this is home monitor systems. There is a need to address defects in IoT hardware and software, which, since they are difficult to correct through software updates, have to be tackled during the design of these devices [1] This topic has been chosen because IoT technology facilitates our daily lives and makes communication between electronic devices more accessible. Besides these features, security and privacy must be provided during the connection of these devices. The remainder of this paper is structured as follows: Section II: Related works, Section III: IoT definition and value, Section IV: IoT architecture, Section V: IoT features, Section VI: IoT security requirements, Section VII: IoT security protocols, Section VIII: IoT applications, Section IX: IoT security challenge, Section X: Categorization of the security issue, Section XI: Security mechanism, Section XII: IoT security solution, Section XIII: Findings, Section XIV: Discussion solution, Section XV: Future works, Section XVI: Conclusion and recommendation

RELATED WORKS
IOT: DEFINITION AND VALUE
ARCHITECTURE OF IOT
Network Layer
Application Layer
Processing Layer
Things-Related Services
SECURITY REQUIREMENTS FOR IOT
Single Points of Failure
MAJOR SECURITY PROTOCOLS FOR IOT
CoAP Protocol
Message Queuing Telemetry Transport
TLS Protocol
HomeKit Accessory Protocol
Wi-Fi Protected Access
RPL Protocol
Thread Protocol
VIII. IOT APPLICATIONS
Smart Home
Smart Healthcare
Smart Cities
Wearable Devices
CHALLENGES IN IOT SECURITY
Security Challenges
Technological Challenges
CATEGORIZATION OF SECURITY ISSUES
Low-Level Security Issues
Intermediate-Level Security Issues
High-Level Security Issues
DIFFERENT MECHANISMS FOR ENSURING IOT SECURITY
IOT SECURITY SOLUTIONS
Solutions Provided by Edge Computing to Overcome IoT Security Risks
Solutions Provided by Blockchain to Overcome IoT Security
XIII. FINDINGS
DISCUSSIONS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.