Security Issues in Internet of Things (IoT): A Comprehensive Review

Internet of things (IoT) as an extension of existing global Internet is supposed to make it possible for device-to-device communication beyond the human-to-human communication pattern of the global Internet. Billions of smart devices connected to IoT environment can communicate among themselves using sensors and actuators that lead to complex security provisioning for efficient communication across IoT globally. In this paper, we detail the major security as well as privacy issues and possible resolution strategies as extracted from the research work of various authors in this field.

[1]  Paul Fremantle,et al.  A survey of secure middleware for the Internet of Things , 2017, PeerJ Comput. Sci..

[2]  Munam Ali Shah,et al.  A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT , 2017 .

[3]  Faheem Zafari,et al.  Microlocation for Internet-of-Things-Equipped Smart Buildings , 2015, IEEE Internet of Things Journal.

[4]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[5]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[6]  Praveen Gauravaram,et al.  LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.

[7]  Jean-Pierre Hubaux,et al.  Security Issues in Next Generation Mobile Networks: LTE and Femtocells , 2010 .

[8]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[9]  Mohammed Abdul Qadeer,et al.  Security concerns in WiMAX , 2009, 2009 First Asian Himalayas International Conference on Internet.

[10]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[11]  I. Mahgoub,et al.  Bluetooth Security in Wearable Computing Applications , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[12]  Jonathan Loo,et al.  Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802-11 Wireless Mesh Networks , 2009, J. Digit. Content Technol. its Appl..

[13]  Claudio Cicconetti,et al.  Performance analysis of an LTE gateway for the IoT , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[14]  Carlos Serôdio,et al.  Virtual Machines Applied to WSN's: The state-of-the-art and classification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[15]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[16]  Artem Katasonov,et al.  Challenges of Middleware for the Internet of Things , 2009 .

[17]  Michael Devetsikiotis,et al.  A survey on next generation mobile WiMAX networks: objectives, features and technical challenges , 2009, IEEE Communications Surveys & Tutorials.

[18]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[19]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[20]  S.M. Siddique,et al.  Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[21]  Baijian Yang,et al.  Internet of things: Survey on security , 2017, Inf. Secur. J. A Glob. Perspect..

[22]  Amy L. Murphy,et al.  LIME: a middleware for physical and logical mobility , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[23]  Sir Padampat,et al.  An analysis of Security Issues of Internet of Things (IoT) , 2015 .

[24]  Ricardo Neisse,et al.  Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[25]  Kevin Curran,et al.  Near Field Communication , 2012 .

[26]  Josef Langer,et al.  NFC Devices: Security and Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[27]  Rick Huhn,et al.  Security Standards for the RFID Market , 2005, IEEE Secur. Priv..

[28]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[29]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.