Security Issues in the Internet of Things (IoT): A Comprehensive Study

Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired, cellular, or adhoc networks. Wireless sensor networks, actuator networks, and vehicular networks have received a great attention in society and industry. In recent years, the Internet of Things (IoT) has received considerable research attention. The IoT is considered as future of the internet. In future, IoT will play a vital role and will change our living styles, standards, as well as business models. The usage of IoT in different applications is expected to rise rapidly in the coming years. The IoT allows billions of devices, peoples, and services to connect with others and exchange information. Due to the increased usage of IoT devices, the IoT networks are prone to various security attacks. The deployment of efficient security and privacy protocols in IoT networks is extremely needed to ensure confidentiality, authentication, access control, and integrity, among others. In this paper, an extensive comprehensive study on security and privacy issues in IoT networks is provided.

[1]  Yong Ho Hwang IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.

[2]  Lyman Chapin,et al.  The Internet of Things: An Overview , 2015 .

[3]  Apurva Mohan,et al.  Cyber Security for Personal Medical Devices Internet of Things , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.

[4]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[5]  Sachchidanand Singh,et al.  Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[6]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[7]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[8]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[9]  Seokung Yoon,et al.  Security Issues on Smarthome in IoT Environment , 2015 .

[10]  Ashfaque Ahmed,et al.  Digital Image Security: Fusion of Encryption, Steganography and Watermarking , 2017 .

[11]  Abdul Aziz,et al.  Comparative Analysis and Implementation of EfficientDigital Image Watermarking Schemes , 2012 .

[12]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[13]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[14]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[15]  Lyman Chapin,et al.  THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .

[16]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[17]  Lisandro Zambenedetti Granville,et al.  Internet of Things in healthcare: Interoperatibility and security issues , 2012, 2012 IEEE International Conference on Communications (ICC).

[18]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.