Abstract

Abstract. Smart environments provide many benefits to the users including comfort, convenience, energy efficiency, safety, automation, and service quality. The Internet of Things (IoT) has developed to become one of the widely used technologies in smart environments. Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. As a result, security is one of the most important issues in any smart area or environment based on the IoT model. This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. It also reviews some of the current solutions that ensure the security of information in smart environments applications.

Highlights

  • The smart environment is a term developed from the idea of Ubiquitous computing or physical word that contains numerous sensors, controllers, actuators and other computational elements that interact with each other to make people's lives more comfortable and smarter, facilitate communication and improve performance and quality of services

  • As one of the objectives of the smart environment is the improvement of quality of human life in terms of comfort and efficiency, the Internet of Things (IoT) paradigm has recently grown into technology for building and developing smart areas (Elrawy et al, 2018), which means that it becomes the key ingredient for the development of many smart environments such as smart cities, smart homes, smart campus, smart health etc, by automating things to communicate in a network to realize many services (Ikrissi and Mazri, 2020b)

  • The purpose of this paper is to present various IoT security attacks in smart environments, as well as some solutions based on the Internet of Things architecture, which is divided into four layers: (1) the physical layer, (2) the network layer, (3) the platform layer, and (4) the application layer (Figure 1)

Read more

Summary

INTRODUCTION

The smart environment is a term developed from the idea of Ubiquitous computing or physical word that contains numerous sensors, controllers, actuators and other computational elements that interact with each other to make people's lives more comfortable and smarter, facilitate communication and improve performance and quality of services. IoT technology, communication, and computation resources are used in smart cities to improve the quality of life and services available to citizens and urban environments It can control objects in real-time and provide citizens with intelligent information in areas such as smart traffic management, smart transportation, traffic systems, and smart agriculture, etc (Al‐ Turjman et al, 2019). The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XLVI-4/W5-2021 The 6th International Conference on Smart City Applications, 27–29 October 2021, Karabuk University, Virtual Safranbolu, Turkey optimization, drought response, irrigation, land suitability, and pest control (Ayaz et al, 2019) The use of such advanced features in smart agriculture can assist in achieving high yields and saving farmers monetary losses.

RELATED WORKS
IOT SECURITY THREATS IN SMART ENVIRONMENTS
Security threats at the physical layer
Malicious code injection attack
Eavesdropping attack
Security threats at the network layer
Routing attack
Traffic analysis attacks
Security threats at the platform layer
Cloud malware injection
SQL injection
Storage attacks
Side-channel attacks
Security threats at the application layer
Sniffing attack
Data thefts
SECURITY SOLUTIONS FOR IOT-BASED SMART ENVIRONMENTS
Blockchain
Machine learning
Biometrics
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.