Comprehensive Survey Over Security and Protection Issues of IoT Devices

  • Muhammad Waqas
  • Muhammad Jawad Noonari
  • Hamza Altaf Khatri
  • Umair Saeed
Keywords: Internet of Things (IoT), IoT security, IoT gadgets, IoT security resolving issues.

Abstract

The Internet of Things (IoT) technology has been involved nearly in each sector of daily life from home to industries level. It is another modern worldview pictured as a standard employer of interconnected machines. IoT technology brought easiness and increased the efficiency of communication between human and devices as compared to manual devices. Due to the increment in the usage of IoT devices in residential and commercial areas, these devices attracted the attackers for the security breaches. The main function of IoT security is to promise to provide the security and protection of private data of IoT users, data and devices and infrastructure. The end users are like a layman and do not have enough knowledge of these security holes that is why they are the easy target for the attackers. Various methods are acquainted with lift out and make use of IoT ideas. IoT technology is playing a critical role in every field like savvy properties and intelligent city areas, elevating safety concerns. This paper presents a review on security threats, the reason and order of these threats, and the preparations that had been given towards these IoT protection issues.

References

[1] WAQAS, M, KUMAR, K, LAGHARI, AA, ET AL. BOTNET ATTACK DETECTION IN INTERNET OF THINGS DEVICES OVER CLOUD ENVIRONMENT VIA MACHINE LEARNING. CONCURRENCY COMPUTAT PRACT EXPER. 2022; 34( 4):E6662. DOI:10.1002/CPE.6662.
[2] K. SHA, W. WEI, T. ANDREW YANG, Z. WANG, W. SHI, ON SECURITY CHALLENGES AND OPEN ISSUES IN INTERNET OF THINGS, FUTUR. GENER. COMPUT. SYST. 83 (2018) 326–337.
[3] A. RIAHI SFAR, E. NATALIZIO, Y. CHALLAL, Z. CHTOUROU, A ROADMAP FOR SECURITY CHALLENGES IN THE INTERNET OF THINGS, DIGIT. COMMUN. NETWORKS 4 (2) (2018) 118–137.
[4] F.A. ALABA, M. OTHMAN, I.A.T. HASHEM, F. ALOTAIBI, INTERNET OF THINGS SECURITY: A SURVEY, J. NETW. COMPUT. APPL. 88 (2017) 10–28 DECEMBER 2016.
[5] D.E. KOUICEM, A. BOUABDALLAH, H. LAKHLEF, INTERNET OF THINGS SECURITY: A TOP– DOWN SURVEY, COMPUT. NETWORKS 141 (2018) 199–221.
[6] K. CHEN, S. ZHANG, Z. LI, Y. ZHANG, Q. DENG, S. RAY, Y. JIN, INTERNET-OF-THINGS SECURITY AND VULNERABILITIES : TAXONOMY, CHALLENGES, AND PRACTICE, JOURNAL OF HARDWARE AND SYSTEMS SECURITY 2 (2018) 97–110.
[7] H.Z. YUCHEN YANG, LONGFEI WU, GUISHENG YIN, LIJIE LI, A SURVEY ON SECURITY AND PRIVACY ISSUES IN INTERNET-OF-THINGS, IN: 2015 10TH INT. CONF. INTERNET TECHNOL. SECUR. TRANS., 4, 2015, PP. 202–207.
[8] J. LIN, W. YU, N. ZHANG, X. YANG, H. ZHANG, W. ZHAO, A SURVEY ON INTERNET OF THINGS: ARCHITECTURE, ENABLING TECHNOLOGIES, SECURITY AND PRIVACY, AND APPLICATIONS, IEEE INTERNET THINGS J. 4 (5) (2017) 1125–1142.
[9] LIU, PENG, RUN YANG, AND ZHIGANG XU. "HOW SAFE IS SAFE ENOUGH FOR SELF‐DRIVING VEHICLES?." RISK ANALYSIS 39.2 (2019): 315-325.
[10] UPADHYAY, DARSHANA, AND SRINIVAS SAMPALLI. "SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) SYSTEMS: VULNERABILITY ASSESSMENT AND SECURITY RECOMMENDATIONS." COMPUTERS & SECURITY 89 (2020): 101666.
[11] CUI, LI, AND XIAOLAN XIE. "WIRELESS SENSOR NETWORKS." (2019).
[12] A. TEWARI, B.B. GUPTA, SECURITY, PRIVACY AND TRUST OF DIFFERENT LAYERS IN INTERNETOF-THINGS (IOTS) FRAMEWORK, FUTUR. GENER. COMPUT. SYST. (2018) 1– 13, DOI:10. 1016/J.FUTURE.2018.04.027.
[13] KUMAR, SANJEEV, AND SUKHVINDER SINGH DEORA. "SECURITY CHALLENGES AND ISSUES IN IOT." 2021 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC). IEEE, 2021.
[14] BACCELLI, EMMANUEL, ET AL. "RIOT: AN OPEN SOURCE OPERATING SYSTEM FOR LOW-END EMBEDDED DEVICES IN THE IOT." IEEE INTERNET OF THINGS JOURNAL 5.6 (2018): 4428-4440.
[15] MUBASHAR, REHMAN, ET AL. "COMPARATIVE PERFORMANCE ANALYSIS OF SHORT-RANGE WIRELESS PROTOCOLS FOR WIRELESS PERSONAL AREA NETWORK." IRAN JOURNAL OF COMPUTER SCIENCE 4.3 (2021): 201-210.
[16] GIUST, FABIO, ET AL. "MEC DEPLOYMENTS IN 4G AND EVOLUTION TOWARDS 5G." ETSI WHITE PAPER 24.2018 (2018): 1-24.
[17] LIU, FEN, ET AL. "SURVEY ON WIFI‐BASED INDOOR POSITIONING TECHNIQUES." IET COMMUNICATIONS 14.9 (2020): 1372-1383.
[18] KHANJI, SALAM, FARKHUND IQBAL, AND PATRICK HUNG. "ZIGBEE SECURITY VULNERABILITIES: EXPLORATION AND EVALUATING." 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS). IEEE, 2019.
[19] BLUETOOTH, S. I. G. "BLUETOOTH TECHNOLOGY." (2020).
[20] UCUZ, DERYA. "COMPARISON OF THE IOT PLATFORM VENDORS, MICROSOFT AZURE, AMAZON WEB SERVICES, AND GOOGLE CLOUD, FROM USERS’ PERSPECTIVES." 2020 8TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS). IEEE, 2020.
[21] TATYASAHEB, DHOKANE NILIMA, AND BINOD KUMAR. "IMPLEMENTATION AND COMPARISON OF MQTT PROTOCOL TO CHECK THE DRAWBACKS FOR FUTURE ENHANCEMENT." 2021 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND GREEN ENGINEERING (CCGE). IEEE, 2021.
[22] J. SRINIVAS, S. MUKHOPADHYAY, D. MISHRA, AD HOC NETWORKS SECURE AND EFFICIENT USER AUTHENTICATION SCHEME FOR MULTI-GATEWAY WIRELESS SENSOR NETWORKS, AD HOC NETWORKS 54 (2017) 147– 169.
[23] T. SHINZAKI, I. MORIKAWA, Y. YAMAOKA, Y. SAKEMI, IOT SECURITY FOR UTILIZATION OF BIG DATA: MUTUAL AUTHENTICATION TECHNOLOGY AND ANONYMIZATION TECHNOLOGY FOR POSITIONAL DATA, FUJITSU SCI. TECH. J. 52 (4) (2016) 52–60.
[24] M.A. FERRAG, L.A. MAGLARAS, H. JANICKE, J. JIANG, AUTHENTICATION PROTOCOLS FOR INTERNET OF THINGS: A COMPREHENSIVE SURVEY, SECURITY AND COMMUNICATION NETWORKS 2017 (2017) 1–41.
[25] X. LI, J. PENG, J. NIU, F. WU, J. LIAO, K.R. CHOO, A ROBUST AND ENERGY EFFICIENT AUTHENTICATION PROTOCOL FOR INDUSTRIAL INTERNET OF THINGS, IEEE INTERNET OF THINGS JOURNAL 5 (3) (2018) 1606–1615.
[26] J. ZHANG, H. CHEN, L. GONG, J. CAO AND Z. GU, "THE CURRENT RESEARCH OF IOT SECURITY," 2019 IEEE FOURTH INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2019, PP. 346-353, DOI: 10.1109/DSC.2019.00059.
[27] M. CHERNYSHEV, Z. BAIG, O. BELLO, S. ZEADALLY, INTERNET OF THINGS (IOT): RESEARCH, IEEE INTERNET OF THINGS JOURNAL 5 (3) (2018) 1637–1647.
[28] F. WU, X. LI, L. XU, S. KUMARI, M. KARUPPIAH, J. SHEN, A LIGHTWEIGHT AND PRIVACY-PRESERVING MUTUAL AUTHENTICATION SCHEME FOR WEARABLE DEVICES ASSISTED BY CLOUD SERVER, COMPUT. ELECTR. ENG. 63 (2017) 168–181.
[29] L. LIN, T.-T. LIU, S. LI, C. M. S. MAGURAWALAGE, AND S.-S. TU, “PRIGUARDER: A PRIVACY-AWARE ACCESS CONTROL APPROACH BASED ON ATTRIBUTE FUZZY GROUPING IN CLOUD ENVIRONMENTS,” IEEE ACCESS, VOL. 6, PP. 1882– 1893, 2018.
[30] T. HANEL,¨ A. BOTHE, R. HELMKE, C. GERICKE, AND N. ASCHENBRUCK, “ADJUSTABLE SECURITY FOR RFID-EQUIPPED IOT DEVICES,” IN 2017 IEEE IN-TERNATIONAL CONFERENCE ON RFID TECHNOLOGY & APPLICATION (RFID-TA). IEEE, 2017, PP. 208–213.
[31] P. J. H. RATHORE, SHAILENDRA, “SEMI-SUPERVISED LEARNING BASED DISTRIBUTED ATTACK DETECTION FRAMEWORK FOR IOT,” 2018.
[32] P.-Y. LEE, C.-M. YU, T. DARGAHI, M. CONTI, AND G. BIANCHI, “MDSCLONE: MULTIDIMENSIONAL SCALING AIDED CLONE DETECTION IN INTERNET OF THINGS,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 13, NO. 8, 2031–2046, 2018.
[33] I. ONAT AND A. MIRI, “AN INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKS,” IN WIMOB’2005), IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2005., VOL. 3. IEEE, 2005, PP. 253–259.
[34] F. ANJUM, D. SUBHADRABANDHU, S. SARKAR, AND R. SHETTY, “ON OPTIMAL PLACEMENT OF INTRUSION DETECTION MODULES IN SENSOR NETWORKS,” IN FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS. IEEE, 2004, PP. 690–699
Published
2022-08-29
How to Cite
Waqas, M., Noonari, M., Khatri, H., & Saeed, U. (2022). Comprehensive Survey Over Security and Protection Issues of IoT Devices. International Journal of Artificial Intelligence & Mathematical Sciences, 1(1), 30-36. https://doi.org/10.58921/ijaims.v1i1.20