CFP last date
20 June 2024
Reseach Article

A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions

by Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 16
Year of Publication: 2024
Authors: Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama
10.5120/ijca2024923543

Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama . A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions. International Journal of Computer Applications. 186, 16 ( Apr 2024), 14-19. DOI=10.5120/ijca2024923543

@article{ 10.5120/ijca2024923543,
author = { Ghadi Shaheen, Fatmah Alahmadi, Amjad Alsulami, Shaimaa Salama },
title = { A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2024 },
volume = { 186 },
number = { 16 },
month = { Apr },
year = { 2024 },
issn = { 0975-8887 },
pages = { 14-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number16/a-survey-on-iot-security-iot-architecture-security-issues-challenges-and-solutions/ },
doi = { 10.5120/ijca2024923543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-04-27T03:06:46.087520+05:30
%A Ghadi Shaheen
%A Fatmah Alahmadi
%A Amjad Alsulami
%A Shaimaa Salama
%T A Survey on IoT Security: IoT Architecture, Security Issues, Challenges, and Solutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 16
%P 14-19
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Things (IoT) technologies have expanded in diverse domains to create smart environments. According to the distribution of IoT, security aspects must be concerned and improved. The IoT uses different kinds of technologies to produce results. Therefore, it presents new different challenges and issues in security. Several researchers have examined various security issues, threats, challenges, and solutions to increase security in IoT devices. This survey paper presents an introduction to IoT and its purposes. IoT includes three different layers of architecture classified as perception, network, and application layers. The security issues, threats, and challenges in each layer of IoT. The possible solutions to solve the IoT security issues. Moreover, a comparison between IT and IoT security.

References
  1. Kevin Ashton, ”That ’Internet of Things Thing”, RFID Journal, 2009
  2. Madakam, Somayya, et al. "Internet of Things (IoT): A literature review." Journal of Computer and Communications, 2015
  3. B. Li and J. Yu, “Research and application on the smart home based on component technologies and internet of things,” Procedia Engineering, 2011.
  4. Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., “Analysis of a key- establishment security protocol”, Journal of Computer Science and Control Systems, 2008.
  5. Razzaq, Mirza Abdur, et al. "Security issues in the Internet of Things (IoT): A comprehensive study." International Journal of Advanced Computer Science and Applications, 2017
  6. Ebraheim Alsaadi, and Abdallah Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities", International Journal of Advanced Computer Science and Information Technology, 2015
  7. Ziegeldorf, Jan Henrik, Oscar Garcia Morchon, and Klaus Wehrle. "Privacy in the Internet of Things: threats and challenges." Security and Communication Networks, 2014
  8. Vikas, B. O. "Internet of things (IoT): A survey on privacy issues and security." International Journal of Scientific Research in Science,
  9. Engineering and Technology, 2015
  10. Joshitta, R. Shantha Mary, and L. Arockiam. "Security in IoT environment: a survey." International Journal of Information Technology and Mechanical Engineering, 2016
  11. Lin, Jie, et al. "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications." IEEE internet of things journal , 2017
  12. Mahmoud, Rwan, et al. "Internet of things (IoT) security: Current status, challenges and prospective measures." 2015 10th international conference for internet technology and secured transactions (ICITST).
  13. IEEE, 2015
  14. Neshenko, Nataliia, et al. "Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet- scale IoT exploitations." IEEE Communications Surveys & Tutorials, 2019
  15. M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)," Perception, 2015
  16. Sarker, Iqbal H., et al. "Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions." Mobile Networks and Applications, 2022
  17. Daniele Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, "Internet of Things: Vision, applications and research challenges", Ad Hoc Networks, 2012
  18. Md Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", SERVICES, 2015, IEEE World Congress on. IEEE, 2015.
  19. Sicari, Sabrina, et al. "Dynamic policies in internet of things: enforcement and synchronization." IEEE Internet of Things Journal, 2017
  20. Seyum Wolde, Mehir, and Adeel Hussain. "Password Security Assessment of IoT-Devices." 2022
  21. Wang, C. . “Understanding node capture attacks in user authentication schemes for Wireless Sensor Networks,” IEEE Transactions on Dependable and Secure Computing, 2022
  22. Damghani, H. “Classification of Attacks on IoT,” In 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 2019.
  23. Jurcut, A., Ranaweera, P. and Xu, L. (2020) “Introduction to IoT Security.”
  24. Williams, P. “A survey on security in internet of things with a focus on the impact of emerging technologies,” Internet of Things, 2022
  25. Pirretti, M. “The sleep deprivation attack in sensor networks: Analysis and Methods of Defense,” International Journal of Distributed Sensor Networks, 2006
  26. Hassija, V. “A survey on IOT security: Application areas, security threats, and solution architectures,” IEEE Access, 2019
  27. Anand, P. “IOT vulnerability assessment for sustainable computing:
  28. Threats, current solutions, and open challenges,” IEEE Access, 2020
  29. Abughazaleh, N. “DOS attacks in IOT Systems and proposed solutions,” International Journal of Computer Applications, 2020
  30. Aliyu, F., Sheltami, T. and Shakshuki, E.M. “A detection and prevention technique for man in the middle attack in fog computing,”
  31. Procedia Computer Science, 2018
  32. C. Ioannou and V. Vassiliou, “Accurate detection of sinkhole attacks in IOT networks using local agents,” 2020 Mediterranean Communication and Computer Networking Conference (MedComNet), 2020.
  33. I. Ahmad, M. Niazy, R. Ziar, and S. Khan, “Survey on IoT: Security Threats and Applications ,” Journal of Robotics and Control, 2021.
  34. K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber threats to industrial IOT: A survey on attacks and countermeasures,” IoT, 2021
  35. S. G. Abbas, I. Vaccari, F. Hussain, S. Zahid, U. U. Fayyaz, G. A. Shah, T. Bakhshi, and E. Cambiaso, “Identifying and mitigating phishing attack threats in IOT use cases using a threat modelling approach,” Sensors, 2021.
  36. M. Shobana and S. Rathi, “IOT Malware : An Analysis of IOT Device Hijacking,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2018.
  37. T. Aziz and E.-ul Haq, “Security challenges facing IOT layers and its protective measures,” International Journal of Computer Applications, 2018.
  38. B. Prabadevi and N. Jeyanthi, “A Review on Various Sniffing Attacks and its Mitigation Techniques,” Indonesian Journal of Electrical Engineering and Computer Scienc, 2018.
  39. Qu, Jia. “Research on password detection technology of IOT equipment based on Wide Area Network”. In: ICT Express ,2022
  40. S. Sicari, C. Cappiello, F. D. Pellegrini, D. Miorandi, and A. Coen- Porisini, “A security-and quality-aware system architecture for internet of things,” Information Systems Frontiers,2014.
  41. I. K. Dutta, B. Ghosh, and M. Bayoumi, “Lightweight cryptography for internet of insecure things: A survey,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019.
  42. Katagi, Masanobu, and Shiho Moriai. "Lightweight cryptography for the internet of things." sony corporation 2008.
  43. Dhanda, Sumit Singh, Brahmjit Singh, and Poonam Jindal. "Lightweight cryptography: a solution to secure IoT." Wireless Personal Communications 2020
  44. Dos Santos, Giederson Lessa, et al. "A DTLS-based security architecture for the Internet of Things." 2015 IEEE symposium on computers and communication (ISCC). IEEE, 2015.
  45. Kothmayr, Thomas, et al. "DTLS based security and two-way authentication for the Internet of Things." Ad Hoc Networks, 2013
  46. D. Singh, P. Singh, M. Mishra, A. Lamba, and S. Swagatik, “Security Issues In Different Layers Of IoT And Their Possible Mitigation,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, 2020.
  47. Chakrabarti, A., & Manimaran, G. Internet infrastructure security: A taxonomy. IEEE network, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things IoT security Security Solutions Lightweight Cryptography NOS