The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

@article{Zhou2019TheEO,
  title={The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved},
  author={Wei Zhou and Yan Jia and Anni Peng and Yuqing Zhang and Peng Liu},
  journal={IEEE Internet of Things Journal},
  year={2019},
  volume={6},
  pages={1606-1616}
}
Internet of Things (IoT) is an increasingly popular technology that enables physical devices, vehicles, home appliances, etc., to communicate and even inter operate with one another. It has been widely used in industrial production and social applications including smart home, healthcare, and industrial automation. While bringing unprecedented convenience, accessibility, and efficiency, IoT has caused acute security and privacy threats in recent years. There are increasing research works to… 
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
TLDR
A reasoned comparison of the considered IoT technologies with respect to a set of qualifying security attributes, namely integrity, anonymity, confidentiality, privacy, access control, authentication, authorization, resilience, self organization is concluded.
A survey of IoT security threats and defenses
Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information. IoT environment can connect billions of devices
A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
TLDR
A comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented.
Securing the Internet of Things: Current and Future State of the Art
TLDR
This paper aims to address security issues, requirements and various secure mechanisms that can be adopted to provide a secure healthcare system.
Vulnerabilities, Attacks and their Mitigation: An Implementation on Internet of Things (IoT)
IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous computing. Although, there are many challenges in adoption and implementation of IoT based
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers,
Security risk management in IoT environment
Abstract The internet of things (IoT) devices envision great usage in military, civilian contexts, smart grids to smart cities and internet of battlefields to internet of vehicles. The digitally
Open Challenges in Internet of Things Security
TLDR
IoT security challenges was explored collected and categorized, for the purpose of having big picture for the situation and giving a clear idea about the importance of IoT security.
Vulnerabilities to Internet of Things and Current State of the Art of Security Architecture
Internet of Thing (IoT) is one of the most popular systems these days. This ensures internet connectivity of physical devices and everyday objects. This technology is getting popular day by day due
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 68 REFERENCES
Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things
TLDR
It is argued that issues related to security, physical safety, privacy, and usability are tightly interconnected and solutions that address all four simultaneously are needed and tight safety and security standards for individual devices based on existing technology are needed.
A Survey on Security and Privacy Issues in Internet-of-Things
TLDR
This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
The Internet of Things: a security point of view
TLDR
An in-depth overview of the security requirements and challenges for Internet of Things and discuss security solutions for various enabling technologies and implications to various applications is provided.
Security, privacy and trust in Internet of Things: The road ahead
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
TLDR
The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network
TLDR
In this paper, a lightweight defensive algorithm for DDoS attack over IoT network environment is proposed and tested against several scenarios to dissect the interactive communication among different types of network nodes.
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices
TLDR
It is argued that if the security and privacy issues are not considered, devices using the solution are inevitably vulnerable and thus the privacy and security of smart home are seriously threatened.
DEMO: An IDS framework for internet of things empowered by 6LoWPAN
TLDR
An Intrusion Detection System (IDS) framework for IoT empowered by IPv6 over low-power personal area network (6LoWPAN) devices which includes a monitoring system and a detection engine has been integrated into the network framework developed within the EU FP7 project `ebbits'.
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms
TLDR
ContexIoT is proposed, a context-based permission system for appified IoT platforms that provides contextual integrity by supporting fine-grained context identification for sensitive actions, and runtime prompts with rich context information to help users perform effective access control.
A multi-cloud based privacy-preserving data publishing scheme for the internet of things
TLDR
This paper proposes two multi-cloud-based outsourced-ABE schemes, namely the parallel-cloud ABE and the chain- cloud ABE, which enable the receivers to partially outsource the computationally expensive decryption operations to the clouds, while preventing user attributes from being disclosed.
...
1
2
3
4
5
...