A Review of Security in Internet of Things

@article{Harbi2019ARO,
  title={A Review of Security in Internet of Things},
  author={Yasmine Harbi and Zibouda Aliouat and Saad Harous and Abdelhak Bentaleb and Allaoua Refoufi},
  journal={Wireless Personal Communications},
  year={2019},
  pages={1-20}
}
Internet of Things (IoT) has drawn significant attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. These diverse application domains can be unified into a single entity referred as smart life. The rapid evolution of the IoT has pushed a race between cyber-criminals and security experts. As billions of connected things… Expand
An Empirical Study on System Level Aspects of Internet of Things (IoT)
TLDR
The current state of art of the functional pillars of IoT and its emerging applications are presented to motivate academicians and researches to develop real-time, energy-efficient, scalable, reliable, and secure IoT applications. Expand
Enhanced authentication and key management scheme for securing data transmission in the internet of things
TLDR
This paper shows that a secure authentication and key management scheme proposed to secure data transmission in WSNs has various security flaws, and proposes an enhanced scheme to overcome the identified security weaknesses. Expand
A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach
TLDR
The experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively. Expand
Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
TLDR
The proposed scheme is based on Elliptic Curve Cryptography (ECC) and Message Authentication Code (MAC) in order to provide end-to-end security in WSNs and achieves better performance compared to a recent related work. Expand
Internet of Things: Classification of attacks using CTM method
TLDR
A new classification of attacks on IoT is proposed, based on Classification Tree Method (CTM), which uses the CTE (Classification Tree Editor) tool to generate and select the test cases. Expand
Security and Threats of RFID and WSNs: Comparative Study
TLDR
A comparative study to analyze the difference between two technologies—Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) and provides a different way of detecting varying attacks in RFID and WSNs. Expand
Environment Based IoT Security Risks and Vulnerabilities Management
TLDR
A new approach for risk management that is specifically tailored for each IoT device is proposed, and some of the vulnerabilities and risks of IoT devices are explained. Expand
IoT Cloud Security Review
  • Fei Chen, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan, H. Truong
  • Computer Science
  • ACM Comput. Surv.
  • 2021
TLDR
The market is providing various consumer-oriented smart IoT devices; the mainstream is the mainstream and the rapid development and integration of the Internet of Things and cloud computing. Expand
The evolution of the Internet of Things (IoT) over the past 20 years
TLDR
A basic bibliometric overview of the IoT from 2000 to 2019 is presented and the thematic evolution of keywords shows that security and algorithm issues have become basic themes in the field of IoT research in recent years. Expand
Exploration of Various Attacks and Security Measures Related to the Internet of Things
TLDR
This work deals with the study of several attacks that are associated with the Internet of Things and also the approaches to secure the IoT systems, and will help in coming up with further up-gradation in the currently implemented security protocols and also in predicting the possible attacks that can be developed against the IoT protocols. Expand
...
1
2
...

References

SHOWING 1-10 OF 69 REFERENCES
Internet of Things security: A survey
TLDR
This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture. Expand
Security Issues in the Internet of Things (IoT): A Comprehensive Study
TLDR
An extensive comprehensive study on security and privacy issues in IoT networks is provided. Expand
Proposed embedded security framework for Internet of Things (IoT)
TLDR
The need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches is highlighted. Expand
Lightweight Mutual Authentication for IoT and Its Applications
  • N. Li, D. Liu, S. Nepal
  • Engineering, Computer Science
  • IEEE Transactions on Sustainable Computing
  • 2017
TLDR
This paper proposes a lightweight mutual authentication protocol based on a novel public key encryption scheme for smart city applications that takes a balance between the efficiency and communication cost without sacrificing the security. Expand
A Survey on Security and Privacy Issues in Internet-of-Things
TLDR
This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers. Expand
Security of the Internet of Things: perspectives and challenges
TLDR
This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole. Expand
Security in the Internet of Things: A Review
TLDR
The research status of key technologies including encryption mechanism, communication security, protecting sensor data and cryptographic algorithms, and the challenges of IoT are discussed. Expand
A roadmap for security challenges in the Internet of Things
TLDR
According to the novel taxonomy of IoT framework, different research challenges will be highlighted, important solutions and research activities will be exposed, and interesting research directions will be proposed to ensure security of IoT components and applications. Expand
SmartOrBAC security and privacy in the Internet of Things
TLDR
This work proposes an authorization access model called SmartOrBAC built around a set of security and performance requirements and enhances the existing OrBAC (Organization-based Access Control) model and adapts it to IoT environments. Expand
Internet of things' authentication and access control
TLDR
This paper mainly analyses existing authentication and access control methods, and then, it designs a feasible one for the IoT. Expand
...
1
2
3
4
5
...