Abstract

The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.

Highlights

  • We live in a time when technology is an essential requirement for all humans, and the evidence is the increased dependence on technology in almost every aspect of our lives

  • Automation, and smart devices have all benefited from the introduction of Internet of Things (IoT) into human life

  • The unprecedented growth in IoT has been crippled with many vulnerabilities and challenges

Read more

Summary

Introduction

We live in a time when technology is an essential requirement for all humans, and the evidence is the increased dependence on technology in almost every aspect of our lives. The physical and virtual objects implanted with sensors, software, and other technologies are interlinked together in IoT [2] It envisages communicating and sharing data with other devices and systems worldwide over the Internet. IoT has sprawled everywhere, starting from the healthcare sector to the big indus of 45 tries It is implantable, wearable, and portable, resulting in a pervasive and interactive world [3]. In [17], Abomhara et al discussed various applications of IoT and the security threats related to them, including vulnerabilities, intruders, and some other attacks.

Motivation
Literature statistics statistics on on IoT
Literature statistics statistics on onIoT
Comparison with Existing Surveys
Scope of the Present Survey and Contributions
Elementary Overview of an IoT System
Gateways and Networks
Cloud Servers and Control Device
Three-Layer Reference Model
Five-Layer Reference Model
Seven-Layer Reference Model
IoT Protocols and Standards
Vulnerability
Taxonomy of Threats and Attacks in IoT
Security Concern at Perception Layer
10. Taxonomy
Security Concern at Abstraction Layer
Security Concern at Network Layer
Security Concern at Transport Layer
Security Concern at Computing Layer
Security Concern at Operation Layer
Security Concern at Application Layer
Security Goals and Roadmap in IoT
Scope of Security Enhancements in IoT with Burgeoning Technologies
BC for IoT
FC for IoT
EC for IoT
ML for IoT
Open Research Problems
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.