Securing the Internet of Things (IoT): A Security Taxonomy for IoT

In Internet of Things (IoT), there is a vast number of connected devices that exist. These devices are collecting and transmitting great volumes of data from device to device, device to enterprise systems, and occasionally from device to humans. Due to the billions of connected devices, there is a great risk of identity and data theft, device manipulation, data falsification, server/network manipulation, and subsequent impact to application platforms. While the number of these interconnected devices continues to grow every day, so does the number of security threats and vulnerabilities posed to these devices. Security is one of the most paramount technological research problems that exist today for IoT. Security has many facets - security built within the device, security of data transmission, and data storage within the systems and its applications. There is an extensive amount of literature that exists on the subject with countless problems as well as proposed solutions; however, most of the existing work does not provide a holistic view of security and data privacy issues within the IoT. The primary goal of this research work is to advance the current state of the art in IoT research by identifying (a) the critical domains where IoT is heavily used, (b) the security requirements and challenges that IoT is currently facing, and (c) the existing security solutions that have been proposed or implemented with their limitations

[1]  Simin Nadjm-Tehrani,et al.  Attitudes and Perceptions of IoT Security in Critical Societal Services , 2016, IEEE Access.

[2]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[3]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[4]  Pascal Urien,et al.  A new approach to investigate IoT threats based on a four layer model , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).

[5]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[6]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[7]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[8]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[9]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[10]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[11]  Young-Gab Kim,et al.  Security Requirements Analysis for the IoT , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).

[12]  Pascal Urien,et al.  Internet of Things: A Definition & Taxonomy , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[13]  Tanupriya Choudhury,et al.  Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[14]  Vyacheslav Kharchenko,et al.  Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model , 2016, 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI).

[15]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[16]  M Menduno The CEO's guide to the Internet. , 2000, Hospitals & health networks.

[17]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Internet of Things Devices , 2016, IEEE Micro.