Abstract

The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecosystem with digital data accessible anywhere and anytime. “Things” in IoT are embedded with sensing, processing, and actuating capabilities and cooperate in providing smart and innovative services autonomously. The rapid spread of IoT services arises different security vulnerabilities that need to be carefully addressed. Several emerging and promising technologies and techniques are introduced to improve the security of IoT. This paper aims to provide an up-to-date vision of the current research topics related to IoT security. Initially, we introduce common elements and protocols of IoT to demystify the origins of threats in IoT. Then, we propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers. Subsequently, we provide a comparison of recent security schemes based on emerging solutions including fog computing, edge computing, software-defined networking (SDN), blockchain, lightweight cryptography, homomorphic and searchable encryption, and machine learning. Finally, security challenges are discussed and future directions are highlighted for future interested researchers.

Highlights

  • T He Internet of Things (IoT) refers to a growing network of everyday physical objects connected to the Internet

  • Mahbub [16] identified the security concerns of various IoT applications. They introduced threat modeling frameworks that can be used in the security designing of IoT systems

  • In this paper, we provided a new taxonomy of IoT security attacks based on levels, purposes and countermeasures

Read more

Summary

INTRODUCTION

T He Internet of Things (IoT) refers to a growing network of everyday physical objects connected to the Internet. According to Cisco, 50 billions of devices are currently estimated to be connected to the Internet [3] These devices are inherently resource-constrained, they have limited memory space, low processing capacity and computation power. Different enabling technologies such as cloud computing evolve as an essential components for the emergence of IoT paradigm [4], as shown if Figure 1. The number of connected IoT devices is predicted to grow to 1 trillion by 2025. - Present emerging solutions that address the IoT security issues and provide a comparison of recent research works based on these solutions. - Discuss security challenges and future directions for the IoT systems.

RELATED SURVEYS
Conclusion
IOT APPLICATIONS
SECURITY THREATS OF IOT
EMERGING SECURITY SOLUTIONS
FOG COMPUTING-BASED SOLUTIONS
EDGE COMPUTING-BASED SOLUTIONS
MACHINE LEARNING-BASED SOLUTIONS
SECURITY CHALLENGES AND FUTURE DIRECTIONS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.