A Comprehensive Study on Critical Security Issues and Challenges of the IoT World

The Internet of Things (IoT) expected for infinite connectivity among various elements or “things”. It converges with interpersonal organizations, enabling individuals and gadgets to collaborate, and facilitating data sharing. However, security and protection issues are an incredible test for IoT, yet they are likewise empowering components to make a “trust environment”. The inherent vulnerabilities of IoT gadgets, with restricted assets and heterogeneous innovations, together with the absence of specifically planned IoT models, representable to reproduce ground for the development of specific digital dangers. In this paper, we begin with the three main key layers of the IoT system model: 1) perception; 2) network; and 3) application levels and continue on with information security-related challenges that IoT will encounter. Finally, as a result of the examination, authors will highlight the most critical issues with the point of managing future research directions.

[1]  Mesud Hadzialic,et al.  Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues , 2018, Comput. Networks.

[2]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[3]  Eui-Nam Huh,et al.  Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.

[4]  Manan Shah,et al.  Optimization of Smart Traffic Governance System Using Artificial Intelligence , 2020 .

[5]  Yangyong Zhu,et al.  The Challenges of Data Quality and Data Quality Assessment in the Big Data Era , 2015, Data Sci. J..

[6]  Rahul Gupta,et al.  ABC of Internet of Things: Advancements, benefits, challenges, enablers and facilities of IoT , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[7]  Munam Ali Shah,et al.  A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT , 2017 .

[8]  Klaus Wehrle,et al.  Privacy in the Internet of Things: threats and challenges , 2014, Secur. Commun. Networks.

[9]  Staffan Björk,et al.  Privacy and information integrity in wearable computing and ubiquitous computing , 2000, CHI Extended Abstracts.

[10]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Darshan Patel,et al.  Implementation of Artificial Intelligence Techniques for Cancer Detection , 2019 .

[12]  Tahir Q. Syed,et al.  Addressing the Future Data Management Challenges in IoT: A Proposed Framework , 2017 .

[13]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[14]  Yanzhen Qu,et al.  Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network Based IoT Systems , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[15]  Dhananjay Singh,et al.  A survey of Internet-of-Things: Future vision, architecture, challenges and services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[16]  Mohammed Mahmudur Rahman,et al.  A comparative study of WLAN security protocols: WPA, WPA2 , 2015, 2015 International Conference on Advances in Electrical Engineering (ICAEE).

[17]  Manan Shah,et al.  Fatigue Detection Using Artificial Intelligence Framework , 2019, Augmented Human Research.

[18]  Vinton G. Cerf,et al.  Access Control and the Internet of Things , 2015, IEEE Internet Comput..

[19]  Udai Pratap Rao,et al.  Internet of Things — Architecture, applications, security and other major challenges , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[20]  Sudhir T. Bagade,et al.  Internet of Things: Architecture, Security Issues and Countermeasures , 2015 .

[21]  Manan Shah,et al.  A Comparative Analysis of Logistic Regression, Random Forest and KNN Models for the Text Classification , 2020, Augmented Human Research.

[22]  Manan Shah,et al.  Application on Virtual Reality for Enhanced Education Learning, Military Training and Sports , 2019, Augmented Human Research.

[23]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[24]  Manan Shah,et al.  Preprocessing of Non-symmetrical Images for Edge Detection , 2019 .

[25]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[26]  Ricardo Neisse,et al.  Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[27]  Manan Shah,et al.  Biometric authentication and image encryption for image security in cloud framework , 2019, Multiscale and Multidisciplinary Modeling, Experiments and Design.

[28]  Jianming Liu,et al.  Applications of Internet of Things on smart grid in China , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[29]  Fabiano Hessel,et al.  The importance of a standard securit y archit ecture for SOA-based iot middleware , 2015, IEEE Communications Magazine.

[30]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[31]  Saleem Ullah,et al.  Security Issues in the Internet of Things (IoT): A Comprehensive Study , 2017 .

[32]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .

[33]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[34]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[35]  Chetana Prakash,et al.  Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[36]  Aalap Doshi,et al.  A comprehensive review on automation in agriculture using artificial intelligence , 2019, Artificial Intelligence in Agriculture.

[37]  Manan Shah,et al.  A Comprehensive Analysis Regarding Several Breakthroughs Based on Computer Intelligence Targeting Various Syndromes , 2020 .

[38]  Elisa Bertino,et al.  Data Security and Privacy in the IoT , 2016, EDBT.

[39]  Amala V. Rajan,et al.  Internet of Things (IoT): Application systems and security vulnerabilities , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[40]  Ramjee Prasad,et al.  Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges , 2010, CNSA.

[41]  Manan Shah,et al.  Machine learning in films: an approach towards automation in film censoring , 2019, Journal of Data, Information and Management.

[42]  Thomas Bartzanas,et al.  Internet of Things in agriculture, recent advances and future challenges , 2017 .

[43]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[44]  Yash Patel,et al.  Multi-label Movie Genre Detection from a Movie Poster Using Knowledge Transfer Learning , 2019 .

[45]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[46]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[47]  Wenjun Luo,et al.  Ensuring the data integrity in cloud data storage , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[48]  Daniel W. Engels,et al.  Black networks for Bluetooth Low Energy , 2016, 2016 IEEE International Conference on Consumer Electronics (ICCE).

[49]  Muneer Bani Yassein,et al.  Application layer protocols for the Internet of Things: A survey , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[50]  Anass Sedrati,et al.  A Survey of Security Challenges in Internet of Things , 2018 .

[51]  Fenye Bao,et al.  Dynamic Trust Management for Mobile Networks and Its Applications. , 2013 .

[52]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[53]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[54]  Rino Falcone,et al.  Trust is much more than subjective probability: mental components and sources of trust , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[55]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[56]  Michael Blackstock,et al.  IoT mashups with the WoTKit , 2012, 2012 3rd IEEE International Conference on the Internet of Things.

[57]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[58]  Zhang,et al.  Security Architecture on the Trusting Internet of Things , 2011 .

[59]  M. Hossein Ahmadzadegan,et al.  Security challenges in internet of things: survey , 2017, 2017 IEEE Conference on Wireless Sensors (ICWiSe).

[60]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[61]  Manan Shah,et al.  Panacea of challenges in real-world application of big data analytics in healthcare sector , 2019, Journal of Data, Information and Management.

[62]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[63]  P. Balamuralidhar,et al.  Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[64]  Lida Xu,et al.  An Integrated System for Regional Environmental Monitoring and Management Based on Internet of Things , 2014, IEEE Transactions on Industrial Informatics.

[65]  Babar Shah,et al.  Security analysis of IoT protocols: A focus in CoAP , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).

[66]  Alexis Olivereau,et al.  Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[67]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[68]  Sabah Suhail,et al.  Introducing Secure Provenance in IoT: Requirements and Challenges , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).

[69]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[70]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[71]  Imran A. Zualkernan,et al.  Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures , 2015 .

[72]  Luca Veltri,et al.  A novel batch-based group key management protocol applied to the Internet of Things , 2013, Ad Hoc Networks.

[73]  Imad Fakhri Taha Alshaikhli,et al.  Comparative study on 4G/LTE cryptographic algorithms based on different factors , 2014 .

[74]  Manan Shah,et al.  The Intertwine of Brain and Body: A Quantitative Analysis on How Big Data Influences the System of Sports , 2020, Annals of Data Science.

[75]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[76]  Ronnie D. Caytiles,et al.  Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security , 2011 .

[77]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[78]  David R. Kuhn,et al.  Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .

[79]  F. Sandu,et al.  A security analysis on standard IoT protocols , 2016, 2016 International Conference on Applied and Theoretical Electricity (ICATE).

[80]  Jessye Dos Santos,et al.  Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.

[81]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[82]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[83]  Yacine Challal,et al.  A Systemic Approach for IoT Security , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[84]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[85]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[86]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.