Security Issues in Internet of Things: A Comprehensive Review
Keywords:
Blockchain, IoT, security threat, protocol.Abstract
IoT devices can be insecure and may not be able to defend themselves against a wide variety of security threats. This is primarily due to the reason that resources on IoT devices are limited. Standards that govern the development of these devices are not yet mature. Moreover, the design, development and deployment of the software and hardware is not at all secure. The solution to these problems is that a global mechanism should be developed that is robust for securing the IoT layers. Major bottleneck in this approach is that the resources in IoT devices are very diverse in nature, based on several technologies and protocols which make it quite challenging to develop a universal protocol to meet the security threats. These threats have been divided into low level, middle level and high level layers of IoT. In this article, various mechanisms for handling security issues at different IoT layers have been reviewed. Attacks in IoT, their implications, solutions and role of Blockchain technology to address these problems are briefly presented.
References
International Telecommunication Union, “Measuring the Information Society Report,” International Telecommunication Union (ITU), Report, 2015.
Minhaj Ahmad Khan , Khaled Salah, “ IoT security: Review, blockchain solutions, and open challenges, Future Generation Computer Systems”, Future Generation Computer Systems 82 (2018) 395–411.
G. Noubir, G. Lin, “Low-power DoS attacks in data wireless LANs and countermeasures”, SIGMOBILE Mob. Comput. Commun. Rev. 7 (3) (2003) 29–30.
S.H. Chae, W. Choi, J.H. Lee, T.Q.S. Quek, “Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone”, Trans. Info. for.Sec. 9 (10) (2014) 1617–1628.
Y.-W.P. Hong, P.-C. Lan, C.-C.J. Kuo, “Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches”, IEEE Signal Process. Mag. 30 (5) (2013) 29–40.
L. Xiao, L.J. Greenstein, N.B. Mandayam, W. Trappe, “Channel-Based detection of sybil attacks in wireless networks”, IEEE Transa. Inf. Forensics Secur. 4 (3) (2009) 492–503.
P. Kamalinejad, C. Mahapatra, Z. Sheng, S. Mirabbasi, V.C.M. Leung, Y.L. Guan, “Wireless energy harvesting for the Internet of Things”, IEEE Commun. Mag. 53 (6) (2015) 102–108.
K. Christidis, M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things”, IEEE Access 4 (2016) 2292–2303.
A.M. Antonopoulos, “Mastering Bitcoin: Unlocking Digital Crypto-Currencies”, first ed., O’Reilly Media, Inc., 2014.
J. Mattila, “The blockchain phenomenon: The disruptive potential of distributed consensu architectures”, ETLA working papers: Elinkeinoelämän Tutkimuslaitos, Research Institute of the Finnish Economy, 2016.
H. Kim, “Protection against packet fragmentation attacks at 6LoWPAN adaptation layer”, International Conference on Convergence and Hybrid Information Technology, 2008, pp. 796–801.
Mazonka, Oleg, “Blockchain: Simple Explanation”, Journal of Reference, 29 December 2016.
D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and G. Das, “Everything you Wanted to Know about the Blockchain: Its Promise, Components, Processes, and Problems”, IEEE Consumer Electronics Magazine, Volume 7, Issue 4, July 2018, pp. 06-14.
Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends”, Proceedings of the IEEE International Congress on Big Data, pp. 557-564, 2017.
C.H. Liu, B. Yang, T. Liu, “Efficient naming, addressing and profile services in Internet-of-Things sensory environments”, Ad Hoc Netw. 18 (Suppl. C) (2014) 85–101.
Downloads
Published
How to Cite
Issue
Section
License
Authors who submit papers with this journal agree to the following terms.