Internet of Things: Security and Solutions Survey

Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad

Research output: Contribution to journalReview articlepeer-review

1 Scopus citations

Abstract

The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.

Original languageEnglish
Article number7433
JournalSensors (Switzerland)
Volume22
Issue number19
DOIs
StatePublished - Oct 2022

Keywords

  • Internet of Things
  • authentication framework
  • blockchain
  • cryptography
  • physical unclonable function
  • security and privacy

Fingerprint

Dive into the research topics of 'Internet of Things: Security and Solutions Survey'. Together they form a unique fingerprint.

Cite this