Skip to main content
Log in

A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of things (IoT) is a world wide network and set of paradigms that are intended to allow communications between anything, anytime and anywhere. However, connected objects are in most cases vulnerable due to their constrained resources and the inherent IoT environment conditions, basically, the dynamic aspect, the heterogeneity, and the open and wireless medium of communication. Securing the IoT networks is still an open and challenging issue and the majority of traditional security mechanisms designed so far for Internet doesn’t satisfy IoT security requirements. Recently, the use of emergent technologies such as Artificial Intelligence mechanisms, Blockchain and IoTA as a promising solutions to solve security and privacy problems has shown a yield remarkable performance. In this paper we outline the security requirements proposed for the IoT. We provide a comprehensive taxonomy of the major security issues based on IoT architecture, attack implications and application areas. Furthermore, we tabulate and map the different countermeasures used to solve these threats taking into account new advances in security approaches. Finally, we discuss and compare the enumerated countermeasures for IoT security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. https://iot-analytics.com/top-10-iot-applications-in-2020.

  2. https://securitytoday.com/articles/2020/01/13/the-iot-rundown-for-2020.

  3. https://www.datafoundry.com/blog/what-is-a-permanent-dos-pdos-attack.

References

  1. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.

    Article  Google Scholar 

  2. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access, 7, 82721–82743.

    Article  Google Scholar 

  3. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers and Electrical Engineering, 37(2), 147–159.

    Article  Google Scholar 

  4. Otgonbayar, A., Pervez, Z., & Dahal, K. (2016). Toward anonymizing iot data streams via partitioning. In 2016 IEEE 13th international conference on mobile ad hoc and sensor systems (MASS) (pp. 331–336). IEEE.

  5. Ahanger, T. A., & Aljumah, A. (2018). Internet of things: A comprehensive study of security issues and defense mechanisms. IEEE Access, 7, 11020–11028.

    Article  Google Scholar 

  6. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., et al. (2017). Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) (pp. 1093–1110).

  7. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.

    Article  Google Scholar 

  8. Lu, Y., & Da Xu, L. (2018). Internet of things (iot) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115.

    Article  Google Scholar 

  9. Chae, S. H., Choi, W., Lee, J. H., & Quek, T. Q. (2014). Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), 1617–1628.

    Article  Google Scholar 

  10. Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless sensor network. In International conference on network security and applications (pp. 268–280). Springer.

  11. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336–341). IEEE.

  12. Xiao, L., Greenstein, L. J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.

    Article  Google Scholar 

  13. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of things: The road ahead. Computer Networks, 76, 146–164.

    Article  Google Scholar 

  14. Liao, C. H., Shuai, H. H., & Wang, L. C. (2018). Eavesdropping prevention for heterogeneous Internet of Things systems. In 2018 15th IEEE annual consumer communications and networking conference (CCNC) (pp. 1–2). IEEE.

  15. Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663–667). IEEE.

  16. Kim, H. (2008). Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In 2008 International conference on convergence and hybrid information technology (pp. 796–801). IEEE.

  17. Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., & Wehrle, K. (2013). 6LoWPAN fragmentation attacks and mitigation mechanisms. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 55–66).

  18. Ahmed, F., & Ko, Y. B. (2016). Mitigation of black hole attacks in routing protocol for low power and lossy networks. Security and Communication Networks, 9(18), 5143–5154.

    Article  Google Scholar 

  19. Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.

    Article  Google Scholar 

  20. Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

    Article  Google Scholar 

  21. Kozlov, D., Veijalainen, J., & Ali, Y. (2012). Security and privacy threats in IoT architectures. In BODYNETS (pp. 256–262).

  22. Li, S., & Da Xu, L. (2017). Securing the internet of things. Syngress.

  23. Mathur, A., Newe, T., & Rao, M. (2016). Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors, 16(1), 118.

    Article  Google Scholar 

  24. Kaur, P., & Gurm, J. S. (2016). Detect and prevent HELLO FLOOD attack using centralized technique in WSN. International Journal of Computer Science Engineering and Technology, 7(8), 379–381.

    Google Scholar 

  25. Lin, K. C., Chen, S. Y., & Hung, J. C. (2014). Botnet detection using support vector machines with artificial fish swarm algorithm. Journal of Applied Mathematics, 2014, 1–9.

  26. Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51–58.

    Article  Google Scholar 

  27. Zhang, Q., & Wang, X. (2009). SQL injections through back-end of RFID system. In 2009 International symposium on computer network and multimedia technology (pp. 1–4). IEEE.

  28. Dorai, R., & Kannan, V. (2011). SQL injection-database attack revolution and prevention. Journal International Communication and Technology, 6, 224.

    Google Scholar 

  29. Razzaque, M. A., Milojevic-Jevric, M., Palade, A., & Clarke, S. (2015). Middleware for internet of things: A survey. IEEE Internet of Things Journal, 3(1), 70–95.

    Article  Google Scholar 

  30. Kumar, J., Rajendran, B., Bindhumadhava, B. S., & Babu, N. S. C. (2017). XML wrapping attack mitigation using positional token. In 2017 International conference on public key infrastructure and its applications (PKIA) (pp. 36–42). IEEE.

  31. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.

    Article  Google Scholar 

  32. Nagaraju, K., & Sridaran, R. (2012). A survey on security threats for cloud computing. International Journal of Engineering Research and Technology (IJERT), 1(7), 1–10.

    Google Scholar 

  33. Granjal, J., Monteiro, E., & Silva, J. S. (2014). Network-layer security for the internet of things using TinyOS and BLIP. International Journal of Communication Systems, 27(10), 1938–1963.

    Article  Google Scholar 

  34. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 International conference on distributed computing in sensor systems and workshops (DCOSS) (pp. 1–8). IEEE.

  35. Park, N., & Kang, N. (2016). Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors, 16(1), 20.

    Article  Google Scholar 

  36. Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101.

    Google Scholar 

  37. Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. arXiv:1901.07309.

  38. Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP). RFC 7252. https://doi.org/10.17487/RFC7252

  39. Ahmadi, P., Islam, K., Maco, T., & Katam, M. (2018). A survey on internet of things security issues and applications. In 2018 International conference on computational science and computational intelligence (CSCI) (pp. 925–934). IEEE.

  40. Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.

    Article  Google Scholar 

  41. Atzori, M. (2017). Blockchain-based architectures for the internet of things: A survey. SSRN 2846810.

  42. Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE.

  43. Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., & Ford, B. (2016). Managing identities using blockchains and CoSi. In 9th Workshop on hot topics in privacy enhancing technologies (HotPETs 2016) (No. POST\(_{-}\)TALK).

  44. Gaurav, K., Goyal, P., Agrawal, V., & Rao, S. L. (2015). IoT transaction security. In Proceedings of the 5th international conference on the internet of things (IoT), Seoul, Korea (pp. 26–28).

  45. Hashemi, S. H., Faghri, F., Rausch, P., & Campbell, R. H. (2016). World of empowered IoT users. In 2016 IEEE first international conference on internet-of-things design and implementation (IoTDI) (pp. 13–24). IEEE.

  46. Bahga, A., & Madisetti, V. K. (2016). Blockchain platform for industrial internet of things. Journal of Software Engineering and Applications, 9(10), 533–546.

    Article  Google Scholar 

  47. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.

    Article  Google Scholar 

  48. Brody, P., & Pureswaran, V. (2014). Device democracy: Saving the future of the internet of things. IBM.

  49. Antonopoulos, A. M. (2014). Mastering Bitcoin: Unlocking digital cryptocurrencies. O’Reilly Media, Inc.

  50. Divya, M., & Biradar, N. B. (2018). IOTA-next generation block chain. International Journal of Engineering and Computer Science, 7(04), 23823–23826.

    Google Scholar 

  51. Shabandri, B., & Maheshwari, P. (2019). Enhancing IoT security and privacy using distributed ledgers with IOTA and the Tangle. In 2019 6th International conference on signal processing and integrated networks (SPIN) (pp. 1069–1075). IEEE.

  52. Janečko, T., & Zelinka, I. (2018). Impact of security aspects at the IOTA protocol. In International conference on intelligent information technologies for industry (pp. 41–48). Springer.

  53. Bartolomeu, P. C., Vieira, E., & Ferreira, J. (2018). IOTA feasibility and perspectives for enabling vehicular applications. In 2018 IEEE globecom workshops (GC Wkshps) (pp. 1–7). IEEE.

  54. Quasim, M. T., Khan, M. A., Algarni, F., Alharthy, A., & Alshmrani, G. M. M. (2020). Blockchain Frameworks. In Decentralised internet of things (pp. 75–89). Springer.

  55. Lamtzidis, O., & Gialelis, J. (2018). An IOTA based distributed sensor node system. In 2018 IEEE globecom workshops (GC Wkshps) (pp. 1–6). IEEE.

  56. Sarfraz, U., Alam, M., Zeadally, S., & Khan, A. (2019). Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Computer Networks, 148, 361–372.

    Article  Google Scholar 

  57. Popov, S. (2016). The tangle. cit. on, 131.

  58. Florea, B. C. (2018). Blockchain and Internet of Things data provider for smart applications. In 2018 7th Mediterranean conference on embedded computing (MECO) (pp. 1–4). IEEE.

  59. Chen, W. (2012). An IBE-based security scheme on internet of things. In 2012 IEEE 2nd international conference on cloud computing and intelligence systems (Vol. 3, pp. 1046–1049). IEEE.

  60. Chatzigiannakis, I., Pyrgelis, A., Spirakis, P. G., & Stamatiou, Y. C. (2011). Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems (pp. 715–720). IEEE.

  61. Koo, D., Shin, Y., Yun, J., & Hur, J. (2017). An online data-oriented authentication based on Merkle tree with improved reliability. In 2017 IEEE international conference on web services (ICWS) (pp. 840–843). IEEE.

  62. Wang, J., Li, M., He, Y., Li, H., Xiao, K., & Wang, C. (2018). A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access, 6, 17545–17556.

    Article  Google Scholar 

  63. Pohrmen, F. H., Das, R. K., & Saha, G. (2019). Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey. Transactions on Emerging Telecommunications Technologies, 30(10), e3741.

    Article  Google Scholar 

  64. Merkle, R. C. (1980). Protocols for public key cryptosystems. In 1980 IEEE symposium on security and privacy (pp. 122–122). IEEE.

  65. Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 157–163). IEEE.

  66. Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(10), 351047.

    Article  Google Scholar 

  67. Pourghebleh, B., Wakil, K., & Navimipour, N. J. (2019). A comprehensive study on the trust management techniques in the internet of things. IEEE Internet of Things Journal, 6(6), 9326–9337.

    Article  Google Scholar 

  68. Chen, R., Bao, F., & Guo, J. (2015). Trust-based service management for social internet of things systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 684–696.

    Article  Google Scholar 

  69. Jayasinghe, U., Truong, N. B., Lee, G. M., & Um, T. W. (2016). Rpr: A trust computation model for social internet of things. In 2016 International IEEE conferences on ubiquitous intelligence and computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 930–937). IEEE.

  70. Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In 2012 IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC) (pp. 18–23). IEEE.

  71. Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148–156.

    Article  Google Scholar 

  72. Liu, Y. B., Gong, X. H., & Feng, Y. F. (2014). Trust system based on node behavior detection in internet of things. Journal on Communications, 5, 8–15.

    Google Scholar 

  73. Alrajeh, N. A., Khan, S., Mauri, J. L., & Loo, J. (2014). Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting. Ad Hoc Senser Wireless Networks, 22(1–2), 109–133.

    Google Scholar 

  74. Rae, J. S., Chowdhury, M. M., & Jochen, M. (2019). Internet of things device hardening using shodan. io and ShoVAT: A survey. In 2019 IEEE international conference on electro information technology (EIT) (pp. 379-385). IEEE.

  75. Xiao, L., Li, Y., Han, G., Liu, G., & Zhuang, W. (2016). PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Transactions on Vehicular Technology, 65(12), 10037–10047.

    Article  Google Scholar 

  76. Gwon, Y., Dastangoo, S., Fossa, C., & Kung, H. T. (2013). Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In 2013 IEEE conference on communications and network security (CNS) (pp. 28–36). IEEE.

  77. Xiao, L., Li, Y., Huang, X., & Du, X. (2017). Cloud-based malware detection game for mobile devices with offloading. IEEE Transactions on Mobile Computing, 16(10), 2742–2750.

    Article  Google Scholar 

  78. Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H. P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Communications Surveys and Tutorials, 16(4), 1996–2018.

    Article  Google Scholar 

  79. Ozay, M., Esnaola, I., Vural, F. T. Y., Kulkarni, S. R., & Poor, H. V. (2015). Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Networks and Learning Systems, 27(8), 1773–1786.

    Article  MathSciNet  Google Scholar 

  80. Pavani, K., & Damodaram, A. (2013). Intrusion detection using MLP for MANETs.

  81. Shi, C., Liu, J., Liu, H., & Chen, Y. (2017). Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing (pp. 1–10).

  82. Branch, J. W., Giannella, C., Szymanski, B., Wolff, R., & Kargupta, H. (2013). In-network outlier detection in wireless sensor networks. Knowledge and Information Systems, 34(1), 23–54.

    Article  Google Scholar 

  83. Hwang, T. S., Lee, T. J., & Lee, Y. J. (2007). A three-tier IDS via data mining approach. In Proceedings of the 3rd annual ACM workshop on Mining network data (pp. 1–6).

  84. Cremers, C., Horvat, M., Hoyland, J., Scott, S., & van der Merwe, T. (2017). A comprehensive symbolic analysis of TLS 1.3. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1773–1788).

  85. Rathore, S., Kwon, B. W., & Park, J. H. (2019). BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. Journal of Network and Computer Applications, 143, 167–177.

    Article  Google Scholar 

  86. Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854–864.

    Article  Google Scholar 

  87. Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys and Tutorials, 21(1), 686–728.

    Article  Google Scholar 

  88. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global.

  89. Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access, 5, 3302–3312.

    Article  Google Scholar 

  90. Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A., & Kayssi, A. (2016). Identity-based authentication scheme for the Internet of Things. In 2016 IEEE Symposium on Computers and Communication (ISCC) (pp. 1109–1111). IEEE.

  91. Kalkan, K., & Zeadally, S. (2017). Securing internet of things with software defined networking. IEEE Communications Magazine, 56(9), 186–192.

    Article  Google Scholar 

  92. Di Mauro, A., Fafoutis, X., & Dragoni, N. (2015). Adaptive security in odmac for multihop energy harvesting wireless sensor networks. International Journal of Distributed Sensor Networks, 11(4), 760302.

    Article  Google Scholar 

  93. Taddeo, A. V., Mura, M., & Ferrante, A. (2010). Qos and security in energy-harvesting wireless sensor networks. In 2010 International conference on security and cryptography (SECRYPT) (pp. 1–10). IEEE.

  94. Hellaoui, H., Bouabdallah, A., & Koudil, M. (2016). Tas-iot: trust-based adaptive security in the iot. In 2016 IEEE 41st conference on local computer networks (LCN) (pp. 599–602). IEEE.

  95. Wang, E. K., Wu, T. Y., Chen, C. M., Ye, Y., Zhang, Z., & Zou, F. (2015). Mdpas: Markov decision process based adaptive security for sensors in internet of things. In Genetic and evolutionary computing (pp. 389–397). Springer.

  96. Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), 2483–2495.

    Article  Google Scholar 

  97. Zhang, X., Upton, O., Beebe, N. L., & Choo, K. K. R. (2020). IoT Botnet forensics: A comprehensive digital forensic case study on Mirai Botnet servers. Forensic Science International: Digital Investigation, 32, 300926.

    Google Scholar 

  98. Ghosh, S., Misoczki, R., & Sastry, M. R. (2019). Lightweight post-quantum-secure digital signature approach for IoT motes. IACR Cryptology, 2019, 122.

    Google Scholar 

  99. Shinder, D. L., & Cross, M. (2008). Scene of the cybercrime. Elsevier.

    Google Scholar 

  100. Liu, B., Chiang, J. T., Haas, J. J., & Hu, Y. C. (2010). Coward attacks in vehicular networks. ACM SIGMOBILE Mobile Computing and Communications Review, 14(3), 34–36.

    Article  Google Scholar 

  101. Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials, 22 (3), 1646–1685.

  102. Qu, F., Wu, Z., Wang, F. Y., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.

    Article  Google Scholar 

  103. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57).

  104. Vytarani Mathane and P.V. Lakshmi, (2021). Predictive analysis of ransomware attacks using context-aware AI in IoT systems. International Journal of Advanced Computer Science and Applications (IJACSA), 12(4), 240–244.

  105. Verma, M. E., Iannacone, M. D., Bridges, R. A., Hollifield, S. C., Kay, B., & Combs, F. L. (2020). ROAD: the real ORNL automotive dynamometer controller area network intrusion detection dataset (with a comprehensive CAN IDS dataset survey and guide). arXiv:2012.14600.

  106. Barletta, V. S., Caivano, D., Nannavecchia, A., & Scalera, M. (2020). Intrusion detection for in-vehicle communication networks: An unsupervised kohonen som approach. Future Internet, 12(7), 119.

    Article  Google Scholar 

  107. Alnasser, A., Sun, H., & Jiang, J. (2019). Cyber security challenges and solutions for V2X communications: A survey. Computer Networks.

  108. Ali Alheeti, K. M., Gruebler, A., & McDonald-Maier, K. (2016). Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers, 5(3), 16.

    Article  Google Scholar 

  109. Ghasemi, M., Saadaat, M., & Ghollasi, O. (2019). Threats of social engineering attacks against security of Internet of Things (IoT). In Fundamental research in electrical engineering (pp. 957–968). Springer.

  110. Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., & Douligeris, C. (2020). Security in IoMT communications: A survey. Sensors, 20(17), 4828.

    Article  Google Scholar 

  111. Tsiknas, K., Taketzis, D., Demertzis, K., & Skianis, C. (2021). Cyber threats to industrial IoT: A survey on attacks and countermeasures. IoT, 2(1), 163–188.

    Article  Google Scholar 

  112. Lee, J., Lin, W., & Huang, Y. (2014). A lightweight authentication protocol for Internet of Things, 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1-2.

Download references

Author information

Authors and Affiliations

Authors

Contributions

Not applicable.

Corresponding author

Correspondence to Dorsaf Swessi.

Ethics declarations

Funding

Not applicable.

Availability of Data and Material

Not applicable.

Conflicts of interest

Not applicable.

Code Availability

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Swessi, D., Idoudi, H. A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Wireless Pers Commun 124, 1557–1592 (2022). https://doi.org/10.1007/s11277-021-09420-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09420-0

Keywords

Navigation