Abstract

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.

Highlights

  • The perceived reality of every person consists of physical dimensions but includes a significant virtual presence in cyberspace

  • We focus on security issues related to blockchains, which apply to Internet of Things (IoT) applications

  • IoT devices, especially those connected to the cloud providers can represent problems with privacy, leaking unintended real-world private data

Read more

Summary

Introduction

The perceived reality of every person consists of physical dimensions but includes a significant virtual presence in cyberspace. The cyberspace dimension, is not separate: a huge array of connected sensors brings data from the physical world to cyberspace. These data influence the behavior of people connected to cyberspace, as well as feed back to processes in the physical world, especially in control systems. It is critically important to focus on security aspects of cybernetic reality, especially in domains, where it has a strong interaction with the physical world. The core of the interactions between physical and virtual worlds is due to the emergence and spread of the Internet of Things. The security of complex systems, such as the Internet of Things, requires a combination of partial security solutions, which create a further potential for attacks. Evolutionary techniques are connected to the development of artificial intelligence that oversees the security of our IoT devices and report and prevents possible security incidents

IoT Security Challenges
Physical Attacks
Network Attacks
Software Attacks
Encryption Attacks
How to Improve Security
Cloud and Blockchain in IoT Security
Public Blockchains and IoT Security
Private Blockchains and IoT Security
Postquantum Cryptography Applications
Algorithms Used in IoT Security
Quantum Algorithms That Threaten Our Cryptography
Postquantum Cryptography in IoT
Key Establishment in Postquantum World
Quantum-Resistant Lightweight Digital Signatures
Group Communication Using Limited Devices
Evolutionary Techniques for Security
Findings
Discussion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call