Internet of Things security: A survey

被引:639
作者
Alaba, Fadele Ayotunde [1 ]
Othman, Mazliza [1 ]
Hashem, Ibrahim Abaker Targio [1 ]
Alotaibi, Faiz [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang 43400, Selangor, Malaysia
关键词
IoT; Security; Privacy; ACCESS-CONTROL; EFFICIENT AUTHENTICATION; TRUST MANAGEMENT; HEALTH-CARE; BIG DATA; IOT; ARCHITECTURE; CHALLENGES; PERCEPTION; FRAMEWORK;
D O I
10.1016/j.jnca.2017.04.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT are rapidly increasing with a major security concern. This study focuses on the state-of-the-art IoT security threats and vulnerabilities by conducting an extensive survey of existing works in the area of IoT security. The taxonomy of the current security threats in the contexts of application, architecture, and communication is presented. This study also compares possible security threats in the IoT. We discuss the IoT security scenario and provide an analysis of the possible attacks. Open research issues and security implementation challenges in IoT security are described as well. This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
引用
收藏
页码:10 / 28
页数:19
相关论文
共 112 条
[1]  
Aazam M, 2016, 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC)
[2]   An end-to-end secure key management protocol for e-health applications [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 :184-197
[3]   Secure and dependable software defined networks [J].
Akhunzada, Adnan ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Abdelaziz, Ahmed ;
Khan, Muhammad Khurram ;
Hayat, Amir ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :199-221
[4]   CAR Approach for the Internet of Things [J].
Al-Turjman, Fadi ;
Gunay, Melih .
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2016, 39 (01) :11-18
[5]  
ALFUQAHA A, 2015, IEEE COMMUN SURV TUT, V17, P2347, DOI [DOI 10.1109/COMST.2015.2444095, DOI 10.1109/C0MST.2015.2444095]
[6]  
Aman W., 2016, P 10 INT C INT TECHN, P362
[7]  
[Anonymous], 2011, Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on
[8]  
[Anonymous], FUTUR GENER COMPUT S
[9]  
Babar S., 2015, P 2 INT C WIR COMM V, P1
[10]   Extracting trust information from security system of a service [J].
Bahtiyar, Serif ;
Caglayan, Mehmet Ufuk .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :480-490