A Review of Security in Internet of Things

@article{Harbi2019ARO,
  title={A Review of Security in Internet of Things},
  author={Yasmine Harbi and Zibouda Aliouat and Saad Harous and Abdelhak Bentaleb and Allaoua Refoufi},
  journal={Wireless Personal Communications},
  year={2019},
  pages={1-20}
}
Internet of Things (IoT) has drawn significant attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. These diverse application domains can be unified into a single entity referred as smart life. The rapid evolution of the IoT has pushed a race between cyber-criminals and security experts. As billions of connected things… 
A Survey on Emerging Security Issues, Challenges, and Solutions for Internet of Things (IoTs)
TLDR
This chapter delves into the timeline and the most challenging security and privacy issues that exist in the present scenario and some open issues and future research directions are also discussed.
Security Attacks on the IoT Network with 5G Wireless Communication
TLDR
In this paper, a comprehensive review of previous research related to the security requirements of the IoT and security attacks is conducted.
A lightweight IoT‐based security framework for inventory automation using wireless sensor network
TLDR
The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator and results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact.
An Empirical Study on System Level Aspects of Internet of Things (IoT)
TLDR
The current state of art of the functional pillars of IoT and its emerging applications are presented to motivate academicians and researches to develop real-time, energy-efficient, scalable, reliable, and secure IoT applications.
A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach
TLDR
The experimental results show that the proposed hybrid approach mitigates data exfiltration caused by DDoS and DoS attacks by 95.4%, with average network lifetime, energy consumption, and throughput improvements of 15%, 25%, and 60%, respectively.
Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
TLDR
The proposed scheme is based on Elliptic Curve Cryptography (ECC) and Message Authentication Code (MAC) in order to provide end-to-end security in WSNs and achieves better performance compared to a recent related work.
Internet of Things: Classification of attacks using CTM method
TLDR
A new classification of attacks on IoT is proposed, based on Classification Tree Method (CTM), which uses the CTE (Classification Tree Editor) tool to generate and select the test cases.
A decentralized scalable security framework for end‐to‐end authentication of future IoT communication
TLDR
A decentralized and scalable security framework for future IoT is designed that exploits the advantages of intelligent computing and tree‐based hash for device and request authentication to provide device‐to‐device security.
Security and Threats of RFID and WSNs: Comparative Study
TLDR
A comparative study to analyze the difference between two technologies—Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) and provides a different way of detecting varying attacks in RFID and WSNs.
...
...

References

SHOWING 1-10 OF 70 REFERENCES
Proposed embedded security framework for Internet of Things (IoT)
TLDR
The need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches is highlighted.
Lightweight Mutual Authentication for IoT and Its Applications
TLDR
This paper proposes a lightweight mutual authentication protocol based on a novel public key encryption scheme for smart city applications that takes a balance between the efficiency and communication cost without sacrificing the security.
A Survey on Security and Privacy Issues in Internet-of-Things
TLDR
This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Security of the Internet of Things: perspectives and challenges
TLDR
This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Internet of things' authentication and access control
TLDR
This paper mainly analyses existing authentication and access control methods, and then, it designs a feasible one for the IoT.
Twenty Security Considerations for Cloud-Supported Internet of Things
TLDR
This paper focuses on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies.
Security Challenges and Approaches in Internet of Things
TLDR
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT), and introduces the vulnerable features of the IoT.
...
...