Skip to main content
Log in

A Review on the Security of the Internet of Things: Challenges and Solutions

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Code Availability

This article contains no source code.

Availability of Data and Material

This article contains no data or material other than the articles used for the review and which have been referenced.

References

  1. International Data Corporation. (2019). The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast. Retrieved October 06, 2020, from https://www.idc.com/getdoc.jsp?containerId=prUS45213219.

  2. Schneier, B. (2017). IoT security: What’s plan B? IEEE Security & Privacy, 5, 96–96.

    Article  Google Scholar 

  3. Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665–677.

    Article  Google Scholar 

  4. Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference on—DAC ’15 (pp. 1–6).

  5. Hadnagy, C. (2010). Social engineering: The art of human hacking. Wiley.

    Google Scholar 

  6. Alhalafi, N., & Veeraraghavan, P. (2019). Privacy and security challenges and solutions in IOT: A review. In IOP conference series: Earth and environmental science (Vol. 322, No. 1, pp. 012013). IOP Publishing.

  7. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28.

    Article  Google Scholar 

  8. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.

    Article  Google Scholar 

  9. Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294–1312.

    Article  Google Scholar 

  10. Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(10), 351047.

    Article  Google Scholar 

  11. Abduvaliyev, A., Pathan, A. S. K., Zhou, J., Roman, R., & Wong, W. C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15(3), 1223–1237.

    Article  Google Scholar 

  12. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146–164.

    Article  Google Scholar 

  13. Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26–33.

    Article  Google Scholar 

  14. Yi, S., Qin, Z., & Li, Q. (2015). Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685–695). Springer, Cham.

  15. Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., & Kumar, V. (2017). Security and privacy in fog computing: Challenges. IEEE Access, 5, 19293–19304.

    Article  Google Scholar 

  16. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.

    Article  Google Scholar 

  17. Barrow, P., Kumari, R., & Manjula, R. (2016). Security in Cloud computing for service delivery models: Challenges and solutions. Journal of Engineering Research and Applications, 6(4), 76–85.

    Google Scholar 

  18. Hepsiba, C. L., & Sathiaseelan, J. G. R. (2016). Security issues in service models of cloud computing. International Journal of Computer Science and Mobile Computing, 5(3), 610–615.

    Google Scholar 

  19. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.

    Article  Google Scholar 

  20. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access, 7, 82721–82743.

    Article  Google Scholar 

  21. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.

    Article  Google Scholar 

  22. Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.

    Article  Google Scholar 

  23. Kamin, D. A. (2017). Exploring security, privacy, and reliability strategies to enable the adoption of IoT. Minneapolis, MN, United States of America: Walden University.

  24. Prasad, A. V. (Ed.). (2017). Exploring the convergence of big data and the internet of things (Vol. 13, pp. 1–23). IGI Global.

  25. Waraga, O. A., Bettayeb, M., Nasir, Q., & Talib, M. A. (2020). Design and implementation of automated IoT security testbed. Computers & Security, 88, 101648.

    Article  Google Scholar 

  26. Davis, G. (2018). 2020: Life with 50 billion connected devices. In 2018 IEEE international conference on consumer electronics (ICCE) (pp. 1–1). IEEE.

  27. Saha, H. N., Mandal, A., & Sinha, A. (2017). Recent trends in the Internet of Things. In 2017 IEEE 7th annual computing and communication workshop and conference (CCWC) (pp. 1–4). IEEE.

  28. Nordrum, A. (2016). The internet of fewer things [news]. IEEE Spectrum, 53(10), 12–13.

    Article  Google Scholar 

  29. Chase, J. (2013). The evolution of the internet of things. Texas Instruments, 1, 1–7.

    Google Scholar 

  30. Yinbiao, S., Lee, K., Lanctot, P., Jianbin, F., Hao, H., Chow, B., & Desbenoit, J. P. (2014). Internet of things: Wireless sensor networks. White Paper, International Electrotechnical Commission, http://www.iec. ch, 11.

  31. Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: A review. In 2012 international conference on computer science and electronics engineering (Vol. 3, pp. 648–651). IEEE.

  32. Banafa, A. (2019). Three major challenges facing IoT. IEEE Internet of Things Newsletter, 4(3), 12–23.

    Google Scholar 

  33. Pham, C., Lim, Y., & Tan, Y. (2016). Management architecture for heterogeneous IoT devices in home network. In 2016 IEEE 5th Global Conference on Consumer Electronics (pp. 1–5). IEEE.

  34. Van den Abeele, F., Hoebeke, J., Moerman, I., & Demeester, P. (2015). Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things. International Journal of Distributed Sensor Networks, 11(10), 683425.

    Google Scholar 

  35. Vargas, D. C. Y., & Salvador, C. E. P. (2016). Smart IoT gateway for heterogeneous devices interoperability. IEEE Latin America Transactions, 14(8), 3900–3906.

    Article  Google Scholar 

  36. Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The Internet Society (ISOC), 80, 1–50.

    Google Scholar 

  37. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.

    Article  Google Scholar 

  38. Iqbal, M. A., Olaleye, O. G., & Bayoumi, M. A. (2017). A review on internet of things (IoT): Security and privacy requirements and the solution approaches. Global Journal of Computer Science and Technology, 16(2), 1–11.

    Google Scholar 

  39. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  40. Ahlgren, B., Hidell, M., & Ngai, E. C. H. (2016). Internet of things for smart cities: Interoperability and open data. IEEE Internet Computing, 20(6), 52–56.

    Article  Google Scholar 

  41. Alansari, Z., Anuar, N. B., Kamsin, A., Belgaum, M. R., Alshaer, J., Soomro, S., & Miraz, M. H. (2018). Internet of things: Infrastructure, architecture, security and privacy. In 2018 International conference on computing, electronics & communications engineering (iCCECE) (pp. 150–155). IEEE.

  42. Qiu, T., Chen, N., Li, K., Atiquzzaman, M., & Zhao, W. (2018). How can heterogeneous Internet of Things build our future: A Survey. IEEE Communications Surveys & Tutorials, 20(3), 2011–2027.

    Article  Google Scholar 

  43. Bao, F., Chen, R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE transactions on network and service management, 9(2), 169–183.

    Article  Google Scholar 

  44. Kumarage, H., Khalil, I., Tari, Z., & Zomaya, A. (2013). Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. Journal of Parallel and Distributed Computing, 73(6), 790–806.

    Article  Google Scholar 

  45. Duc, A. N., Jabangwe, R., Paul, P., & Abrahamsson, P. (2017). Security challenges in IoT development: A software engineering perspective. In Proceedings of the XP2017 scientific workshops (pp. 1–5).

  46. Barrera, D., Molloy, I., & Huang, H. (2018). Standardizing IoT network security policy enforcement. In Workshop on decentralized IoT security and standards (DISS) (Vol. 2018, p. 6).

  47. Andrea, I., Chrysostomou, C., and Hadjichristofi, G. (2016). Internet of Things: Security vulnerabilities and challenges. In Proceedings—IEEE symposium on computers and communications (pp. 180–187).

  48. Lee, H., Lee, D., Moon, J., Jung, J., Kang, D., Kim, H., & Won, D. (2018). An improved anonymous authentication scheme for roaming in ubiquitous networks. PLoS ONE, 13(3), e0193366.

    Article  Google Scholar 

  49. Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., & Ande, R. (2018). IoT standardisation: Challenges, perspectives and solution. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (pp. 1–9).

  50. Coulter, R., & Pan, L. (2018). Intelligent agents defending for an IoT world: A review. Computers & Security, 73, 439–458.

    Article  Google Scholar 

  51. Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services, 21–28.

  52. Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. In 2014 international conference on privacy and security in mobile systems (PRISMS) (pp. 1–8). IEEE.

  53. Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51–58.

    Article  Google Scholar 

  54. Lee, J. (2018). Collective attestation for manageable IoT environments. Applied Sciences, 8(12), 2652.

    Article  Google Scholar 

  55. Chaudhry, S. A., Naqvi, H., Mahmood, K., Ahmad, H. F., & Khan, M. K. (2017). An improved remote user authentication scheme using elliptic curve cryptography. Wireless Personal Communications, 96(4), 5355–5373.

    Article  Google Scholar 

  56. Mahmood, Z., Ning, H., & Ghafoor, A. (2016). Lightweight two-level session key management for end user authentication in Internet of Things. In 2016 IEEE international conference on internet of things (iThings) and IEEE Green computing and communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 323–327). IEEE.

  57. Zhang, C., & Green, R. (2015). Communication security in internet of thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th symposium on communications & networking (pp. 8–15).

  58. Zhang, Z. K., Cho, M. C. Y., & Shieh, S. (2015). Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM symposium on information, computer and communications security (pp. 1–6).

  59. Henze, M., Hummen, R., & Wehrle, K. (2013). The cloud needs cross-layer data handling annotations. In 2013 IEEE security and privacy workshops (pp. 18–22). IEEE.

  60. Phung, P. H., Truong, H. L., & Yasoju, D. T. (2017). P4SINC-an execution policy framework for IoT services in the edge. In 2017 IEEE international congress on internet of things (ICIOT) (pp. 137–142). IEEE.

  61. Yu, T., Sekar, V., Seshan, S., Agarwal, Y., and Xu, C. (2015). Handling a trillion (unfixable) flaws on a billion devices. In Proceedings of the 14th ACM workshop on hot topics in networksHotNets-XIV (pp. 1–7). ACM Press.

  62. Misra, S., Gupta, A., Krishna, P. V., Agarwal, H., & Obaidat, M. S. (2012). An adaptive learning approach for fault-tolerant routing in Internet of Things. In 2012 IEEE wireless communications and networking conference (WCNC) (pp. 815–819). IEEE.

  63. Kumar, S. A., Vealey, T., and Srivastava, H. (2016). Security in Internet of Things: Challenges, solutions and future directions. In 49th Hawaii international conference on system sciences (HICSS) (pp. 5772–5781). IEEE.

  64. Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17–31.

    Article  Google Scholar 

  65. Karlsson, J., Dooley, L. S., & Pulkkis, G. (2018). Secure routing for MANET connected Internet of Things systems. In 2018 IEEE 6th international conference on future internet of things and cloud (FiCloud) (pp. 114–119). IEEE.

  66. Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198.

    Article  Google Scholar 

  67. Bhardwaj, K., Miranda, J. C., & Gavrilovska, A. (2018). Towards iot-ddos prevention using edge computing. In {USENIX} workshop on hot topics in edge computing (HotEdge 18).

  68. Razzak, F. (2012). Spamming the Internet of Things: A possibility and its probable solution. Procedia Computer Science, 10, 658–665.

    Article  Google Scholar 

  69. Zamfiroiu, A., Iancu, B., Boja, C., Georgescu, T., & Cartas, C. (2019). IoT Architectures for Critical Infrastructures Protection. In European conference on cyber warfare and security (pp. 613–XII). Academic Conferences International Limited.

  70. Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., & Kikiras, P. (2015). On the security and privacy of Internet of Things architectures and systems. In 2015 International workshop on secure internet of things (SIoT) (pp. 49–57). IEEE.

  71. Kozlov, D., Veijalainen, J., & Ali, Y. (2012). Security and privacy threats in IoT architectures. In BODYNETS (pp. 256–262).

  72. Porras, J., Khakurel, J., Knutas, A., & Pänkäläinen, J. (2018). Security challenges and solutions in the internet of things. Nordic and Baltic Journal of Information and Communications Technologies, 2018(1), 177–206.

    Article  Google Scholar 

  73. Arias, O., Rahman, F., Tehranipoor, M., & Jin, Y. (2018). Device attestation: Past, present, and future. In 2018 Design, automation & test in europe conference & exhibition (DATE) (pp. 473–478). IEEE.

  74. Moon, Y. H., & Jeon, Y. S. (2016). Cooperative remote attestation for IoT swarms. In 2016 International conference on information and communication technology convergence (ICTC) (pp. 1233–1235). IEEE.

  75. Carpent, X., Rattanavipanon, N., & Tsudik, G. (2018). Remote attestation of iot devices via smarm: Shuffled measurements against roving malware. In 2018 IEEE international symposium on hardware oriented security and trust (HOST) (pp. 9–16). IEEE.

  76. Carpent, X., Eldefrawy, K., Rattanavipanon, N., Sadeghi, A. R., & Tsudik, G. (2018). Reconciling remote attestation and safety-critical operation on simple iot devices. In 2018 55th ACM/ESDA/IEEE design automation conference (DAC) (pp. 1–6). IEEE.

  77. Carpent, X., Rattanavipanon, N., & Tsudik, G. (2018). Remote attestation via self-measurement. ACM Transactions on Design Automation of Electronic Systems (TODAES), 24(1), 1–15.

    Article  Google Scholar 

  78. Perumal, T., Datta, S. K., & Bonnet, C. (2015). IoT device management framework for smart home scenarios. In 2015 IEEE 4th global conference on consumer electronics (GCCE) (pp. 54–55). IEEE.

  79. Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83–95.

    Article  Google Scholar 

  80. Malina, L., Srivastava, G., Dzurenda, P., Hajny, J., & Fujdiak, R. (2019). A secure publish/subscribe protocol for internet of things. In Proceedings of the 14th international conference on availability, reliability and security (pp. 1–10).

  81. Singh, D., Tripathi, G., & Jara, A. J. (2014). A survey of Internet-of-Things: Future vision, architecture, challenges and services. In 2014 IEEE world forum on Internet of Things (WF-IoT) (pp. 287–292). IEEE.

  82. Abiodun, E. O., Jantan, A., Abiodun, O. I., & Arshad, H. (2020). Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: The case of WhatsApp. Wireless Personal Communications, 112, 1–24.

    Article  Google Scholar 

  83. Omolara, A. E., Jantan, A., Abiodun, O. I., Dada, K. V., Arshad, H., & Emmanuel, E. (2019). A deception model robust to eavesdropping over communication for social network systems. IEEE Access, 7, 100881–100898.

    Article  Google Scholar 

  84. Benazzouz, Y., Munilla, C., Günalp, O., Gallissot, M., & Gürgen, L. (2014). Sharing user IoT devices in the cloud. In 2014 IEEE world forum on internet of things (WF-IoT) (pp. 373–374). IEEE.

  85. Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., & Villari, M. (2011). A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures. In 2011 IEEE international symposium on parallel and distributed processing workshops and PhD forum (pp. 1510–1517). IEEE

  86. Sunyaev, A., & Schneider, S. (2013). Cloud services certification. Communications of the ACM, 56(2), 33–36.

    Article  Google Scholar 

  87. Kunz, T., Selzer, A., & Waldmann, U. (2014). Automatic data protection certificates for cloud-services based on secure logging. In Trusted cloud computing (pp. 59–75). Springer, Cham.

  88. Muñoz, A., & Maña, A. (2013). Bridging the gap between software certification and trusted computing for securing cloud computing. In 2013 IEEE ninth world congress on services (pp. 103–110). IEEE.

  89. Sharma, T., Bambenek, J. C., & Bashir, M. (2020). Preserving privacy in cyber-physical-social systems: An anonymity and access control approach. CEUR WS, 25(30), 16–30.

  90. Ning, H., & Liu, H. (2012). Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2(01), 1.

    Article  Google Scholar 

  91. Thampi, S. M., Pérez, G. M., Westphall, C. B., Hu, J., Fan, C. I., & Mármol, F. G. (Eds.). (2017). Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings (Vol. 746). Springer.

  92. Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 32, 3–16.

    Article  Google Scholar 

  93. Bose, P., Gąsieniec, L. A., Römer, K., & Wattenhofer, R. (Eds.). (2015). Algorithms for Sensor Systems: 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks, Algosensors 2015, Patras, Greece, September 17–18, 2015, Revised Selected Papers (Vol. 9536). Springer.

  94. Coetzee, L., Oosthuizen, D., & Mkhize, B. (2018). An analysis of CoAP as transport in an Internet of Things environment. In 2018 IST-Africa week conference (IST-Africa) (pp. Page-1). IEEE.

  95. Rahman, R. A., & Shah, B. (2016). Security analysis of IoT protocols: A focus in CoAP. In 2016 3rd MEC international conference on big data and smart city (ICBDSC) (pp. 1–7). IEEE.

  96. Chen, X. (2014). Constrained application protocol for internet of things. Retrieved January 3, 2021, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/coap.

  97. Qureshi, M. A., & Munir, A. (2020). PUF-IPA: A PUF-based identity preserving protocol for internet of things authentication. In 2020 IEEE 17th annual consumer communications & networking conference (CCNC) (pp. 1–7). IEEE.

  98. Yilmaz, Y., Gunn, S. R., & Halak, B. (2018). Lightweight PUF-based authentication protocol for IoT devices. In 2018 IEEE 3rd international verification and security workshop (IVSW) (pp. 38–43). IEEE.

  99. Abdul-Ghani, H. A., & Konstantas, D. (2019). A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective. Journal of Sensor and Actuator Networks, 8(2), 22.

    Article  Google Scholar 

  100. Raza, S. (2013). Lightweight security solutions for the internet of things (Doctoral dissertation, Mälardalen University, Västerås, Sweden).

  101. Mazurczyk, W., & Szczypiorski, K. (2014). Advances in digital media security and right management. Multimedia Systems, 20(2), 102–103.

    Article  Google Scholar 

  102. Zhou, L., & Chao, H. C. (2011). Multimedia traffic security architecture for the internet of things. IEEE Network, 25(3), 35–40.

    Article  Google Scholar 

  103. Joshi, J. B., Shyu, M., Chen, S. C., Aref, W., & Ghafoor, A. (2008). A multimedia-based threat management and information security framework. In Multimedia technologies: Concepts, methodologies, tools, and applications (pp. 509–526). IGI Global.

  104. Sadek, I., Rehman, S. U., Codjo, J., & Abdulrazak, B. (2019). Privacy and security of IoT based healthcare systems: Concerns, solutions, and recommendations. In International conference on smart homes and health telematics (pp. 3–17). Springer, Cham.

Download references

Funding

This paper was partially supported by the Center for Cyber Safety and Education, Internal Revenue segregated fund of (ISC)2, Code. EIN: 45–2405127 via the (ISC)2 graduate cybersecurity scholarship award, 311 Park Place Blvd. Suite 610 Clearwater, FL 33759, USA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esther Omolara Abiodun.

Ethics declarations

Conflict of interest

All authors declare that there are no conflicting interests of whatsoever.

Human and Animal’s Rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

Informed consent was not required in this article as no human or animals were involved.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abiodun, O.I., Abiodun, E.O., Alawida, M. et al. A Review on the Security of the Internet of Things: Challenges and Solutions. Wireless Pers Commun 119, 2603–2637 (2021). https://doi.org/10.1007/s11277-021-08348-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08348-9

Keywords

Navigation