Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective

Pervasively implemented IoT systems are introducing unprecedented threats to our society. In this article, aiming to explore the security impact from the emerging and anarchistic IoT systems, we survey the state of the art of the security and privacy issues in the smart IoT world from a networking perspective. We predict that IoT systems will be extensively used by hackers to commit malicious actions given the features of IoT devices and systems. We also discuss the privacy issue caused by IoT systems. Finally, we present our understanding of counterattacks from both the application and theoretical aspects. We hope this article will shed light on the research field for interested readers.

[1]  Mengyuan Li,et al.  You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing , 2016, IEEE Journal on Selected Areas in Communications.

[2]  Song Guo,et al.  Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[4]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[5]  Shin-Ming Cheng,et al.  Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.

[6]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[7]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[8]  Mohsen Guizani,et al.  Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.

[9]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[10]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[11]  Xiaohui Liang,et al.  When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals , 2016, CCS.

[12]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[14]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.