Skip to main content
Log in

A Comprehensive Study on Critical Security Issues and Challenges of the IoT World

  • Original Article
  • Published:
Journal of Data, Information and Management Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) expected for infinite connectivity among various elements or “things”. It converges with interpersonal organizations, enabling individuals and gadgets to collaborate, and facilitating data sharing. However, security and protection issues are an incredible test for IoT, yet they are likewise empowering components to make a “trust environment”. The inherent vulnerabilities of IoT gadgets, with restricted assets and heterogeneous innovations, together with the absence of specifically planned IoT models, representable to reproduce ground for the development of specific digital dangers. In this paper, we begin with the three main key layers of the IoT system model: 1) perception; 2) network; and 3) application levels and continue on with information security-related challenges that IoT will encounter. Finally, as a result of the examination, authors will highlight the most critical issues with the point of managing future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

All relevant data and material are presented in the main paper.

References

  • Ahmed AW, Ahmed MM, Khan OA, Shah MA (2017) A comprehensive analysis on the security threats and their countermeasures of IoT. Int J Adv Comput Sci Appl 8(7):489–501

    Google Scholar 

  • Aazam M, Hung PP, Huh E (2014) Cloud of things: integrating internet of things with cloud computing and the issues involved. Proceedings of International Bhurban Conference on Applied Sciences & Technology, pp 1–6

  • Adnan AH, Abdirazak M, Sadi ABMS, Anam S, Khan SZ, Rahman MM, Omar MM A comparative study of WLAN security protocols: WPA, WPA2. Proceedings of 2015 3rd International Conference on Advances in Electrical Engineering:165–169

  • Ahamed J, Rajan AV (2016) Internet of things (IoT): application systems and security vulnerabilities. IEEE:1–5

  • Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Communication Surveys & Tutorials 17(4):2347–2376

    Article  Google Scholar 

  • Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. IEEE Symposium on Computers and Communication (ISCC) Larnaca 2015:180–187

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw:1–19

  • Abbasi MA, Memon ZA, Syed TQ, Memon J, Alshboul R (2017) Addressing the future data management challenges in IoT: a proposed framework. Int J Adv Comput Sci Appl 8(5):197–207

    Google Scholar 

  • Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and open issues. International Conference on Privacy and Security in Mobile Systems (PRISMS):1–8

  • Ahir K, Govani K, Gajera R, Shah M (2020) Application on virtual reality forenhanced education learning. Military Training and Sports Augmented Human Research 5:7

    Article  Google Scholar 

  • Balte A, Kashid A, Patil B (2015) Security issues in internet of things (IoT): a survey. International Journal of Advanced Research in Computer Science and Software Engineering 5(4):450–455

    Google Scholar 

  • Bao F (2013) Dynamic trust management for mobile networks and its applications. 1–188

  • Bertino E (2016) Data security and privacy in the IoT. Open Proceedings:1–3

  • Brech B, Jamison J, Shao L, Whightwick G (2013) The interconnecting of everything. 1–6

  • Bowers KD, Juels A, Oprea A (2008) HAIL: a high-availability and integrity layer for cloud storage. International Association for Cryptographic Research:187–198

  • Bhabad MA, Bagade ST (2015) Internet of things: architecture, security issues and countermeasures. Int J Comput Appl. 125(14):1–4

    Google Scholar 

  • Blackstock M, Lea R (2012) IoT mashups with the WoTKit. 3rd IEEE International Conference on the Internet of Things:159–166

  • Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) In: Meghanathan N et al (eds) Proposed security model and threat taxonomy for the internet of things (IoT), vol 89. CNSA 2010, CCIS, pp 420–429

  • Cai L, Zhu Y (2015) The challenges of data quality and data quality assessment in the big data era. Data Sci J 14(2):1–10

    Google Scholar 

  • Chakrabarty S, Engels DW (2016) Black networks for bluetooth low energy. 2016 IEEE International Conference on Consumer Electronics (ICCE), pp 11–14

  • Colakovi A, Hadžialic M (2018) Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39

    Article  Google Scholar 

  • Castelfranchi C, Falcone R (2000) Trust is much more than subjective probability: mental components and sources of trust. Proceedings of the 33rd Hawaii International Conference on System Sciences:1–10

  • Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. Future Gener Comp Sy 78(2):544–546

    Article  Google Scholar 

  • Cerf VG (2015) Access control and the internet of things. Backspace, IEEE, Internet Computing:96–97

  • Ferraiolo DF, Cugini JA, Kuhn DR (1995) Role-based access control: features and motivations. Proceedings of the 11th Annual Computer Security Applications Conference:241–248

  • Frustaci M, Pace P, Aloi G, Fortino G (2018) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J 5(4):2483–2495

    Article  Google Scholar 

  • Falk J, Björk S (2000) Privacy and information integrity in wearable computing and ubiquitous computing. Extended Abstracts on Human Factors in Computing Systems:177–178

  • Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7):1–6

    Google Scholar 

  • Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596–1605

    Article  Google Scholar 

  • Gilgor VD, Wing JM (2011) Towards a theory of trust in networks of humans and computers (CMU-CyLab-11-016). Carnegie Mellon University Research Showcase. Presented at the 19th International Workshop on Security Protocols, Cambridge, UK, 1–21

  • Gambetta D (2000) ‘Can we trust?’, In Gambetta, Diego (ed.) Trust: making and breaking cooperative relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213–237

  • Ghorbani HR, Ahmadzadegan MH (2017) Security challenges in internet of things: survey. IEEE Conference on Wireless Sensors:6–11

  • Gupta R, Gupta R (2016) ABC of internet of things: advancements, benefits, challenges, enablers and facilities of IoT. Symposium on Colossal Data Analysis and Networking:1–5

  • Granjal J, Monterio E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17(3):1294–1312

    Article  Google Scholar 

  • Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58:1189–1205

    Article  Google Scholar 

  • Gelogo YE, Caytiles RD, Park B (2011) Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security. Int J Control and Autom 4(4):179–184

    Google Scholar 

  • Gessner D, Olivereau A, Segura AS, Serbanati A (2012) Trustworthy infrastructure services for a secure and privacy-respecting internet of things. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications:998–1003

  • Gu L, Wang J, Sun B (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156

    Article  Google Scholar 

  • Gandhi M, Kamdar J, Shah M (2020) Preprocessing of non-symmetrical images for edge detection. Augment Hum Res 5:10. https://doi.org/10.1007/s41133-019-0030-5

    Article  Google Scholar 

  • Hennebert C, Santos JD (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398

    Article  Google Scholar 

  • Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services:21–28

  • Joshitta RSM, Arockiam L (2016) Security in IoT environment: a survey. Int J Inf Technol Mech Eng 2(7):1–8

    Google Scholar 

  • Jha K, Doshi A, Patel P, Shah M (2019) A comprehensive review on automation in agriculture using artificial intelligence. Artificial Intelligence in Agriculture 2:1–12

    Article  Google Scholar 

  • Jani K, Chaudhuri M, Patel H, Shah M (2019) Machine learning in films: an approach towards automation in film censoring. J of Data, Inf and Manag. https://doi.org/10.1007/s42488-019-00016-9

  • Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90(11):20–26

    Google Scholar 

  • Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411

    Article  Google Scholar 

  • Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. 10th International Conference on Frontiers of Information Technology (FIT): Proceedings:257–260

  • Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidiscip Model Exp and Des:1–16. https://doi.org/10.1007/s41939-019-00049-y

  • Kundalia K, Patel Y, Shah M (2020) Multi-label movie genre detection from a movie poster using knowledge transfer learning. Augment Hum Res 5:11. https://doi.org/10.1007/s41133-019-0029-y

    Article  Google Scholar 

  • Lopez J, Roman R, Alcaraz C (2009) Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: Aldini A, Barthe G, Gorrieri R (eds) Foundations of security analysis and design V. FOSAD 2009, FOSAD 2007, FOSAD 2008, vol 5705. Lecture Notes in Computer Science, pp 1–50

  • Liu J, Li X, Chen X, Zhen Y, Zeng L (2011) Application of internet of things on smart grid in China. 13th International Conference on Advanced Communication Technology (ICACT2011), pp 13–17

  • Luo W, Bai G (2011) Ensuring the data integrity in cloud data storage. IEEE International Conference on Cloud Computing and Intelligence Systems 240–243

  • Maple C (2017) Security and privacy in the internet of things. J Cyber Policy 2(2):155–184

    Article  Google Scholar 

  • Mahalle P, Babar S, Prasad NR, Prasad R (2010) Identity management framework towards internet of things (IoT): roadmap and key challenges. In: Meghanathan N., Boumerdassi S., Chaki N., Nagamalai D. (eds) Recent trends in network security and applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg

  • Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10:1497–1516

    Article  Google Scholar 

  • Neeraj SA (2016) Internet of things and trust management in IoT – review. Int Res J Eng Technol 3(6):761–767

    Google Scholar 

  • Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the internet of things. IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications:165–172

  • Patra L, Rao UP (2016) Internet of things – architecture, applications, security and other major challenges. Proceedings of the 10th INDIACom; INDIACom-2016; IEEE 3rd International Conference on “Computing for Sustainable Global Development”:1894–1899

  • Perera C, Zaslavsky A, Georgakopoulos D (2013) Context aware computing for the internet of things: a survey. IEEE Communications Surveys & Tutorials 16(1):414–454

    Article  Google Scholar 

  • Patel D, Shah Y, Thakkar N, Shah K, Shah M (2020a) Implementation of artificial intelligence techniques for cancer detection. Augment Hum Res 5(1). https://doi.org/10.1007/s41133-019-0024-3

  • Parekh V, Shah D, Shah M (2020) Fatigue detection using artificial intelligence framework. Augmented Human Research 5:5

    Article  Google Scholar 

  • Patel D, Shah D, Shah M (2020b) The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports. Ann Data Sci. https://doi.org/10.1007/s40745-019-00239-y

  • Pandya R, Nadiadwala S, Shah R, Shah M (2020) Build out of methodology for meticulous diagnosis of K-complex in EEG for aiding the detection of alzheimer’s by artificial intelligence. Augment Human Res https://link.springer.com/article/10.1007/s41133-019-0021-6

  • Qu Y, Chan P (2016) Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems. IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, IEEE International Conference on Intelligent Data and Security:42–48

  • Rahman RA, Shah B (2016) Security analysis of IoT protocols: a focus in CoAP. 3rd MEC International Conference on Big Data and Smart City:1–7

  • Razzaq MA, Qureshi MA, Gill SH, Ullah S (2017) Security issues in the internet of things (IoT): a comprehensive study. Int J Adv Comput Sci Appl 8(6):383–388

    Google Scholar 

  • Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: DCOSS, 2013, Boston, pp 351, hal-00868362f–355. https://doi.org/10.1109/DCOSS.2013.78

  • Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sensors J 13(10):3711–3720

    Article  Google Scholar 

  • Sulaiman AG, Al Shaikhli IF (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. Int J Comput Sci Telecommun 5(7):7–10

    Google Scholar 

  • Sedrati A, Mezrioui A (2018) A survey of security challenges in internet of things. Adv Sci Tech Eng Syst 3(1):274–280

    Article  Google Scholar 

  • Singh D, Tripathi G, Jara AJ (2014) A survey of internet-of-things: future vision, architecture, challenges and services. IEEE World Forum on Internet of Things, pp 287–292

  • Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. International Conference on Computer Science and Electronics Engineering:648–651

  • Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  • Sheng Z, Yang S, Yu Y, Vasilakos AV, Mccann JA, Leung KK (2013) IEEE wireless. Communications. 91–98

  • Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for internet of things. Fifth International Conference on Communication Systems and Network Technologies:746–751

  • Suhail S, Ahmad ZU, Zafar F, Khan A (2016) Introducing secure provenance in IoT: requirements and challenges. International Workshop on Secure Internet of Things:39–46

  • Shah G, Shah A, Shah M (2019) Panacea of challenges in real-world application of big data analytics in healthcare sector. Data Inf and Manag:1–10. https://doi.org/10.1007/s42488-019-00010-1

  • Shah D, Dixit R, Shah A, Shah P, Shah M (2020a) A comprehensive analysis regarding several breakthroughs based on computer intelligence targeting various syndromes. Augment Hum Res 5:14. https://doi.org/10.1007/s41133-020-00033-z

    Article  Google Scholar 

  • Shah K, Patel H, Sanghvi D, Shah M (2020b) A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment Hum Res 5:12. https://doi.org/10.1007/s41133-020-00032-0

  • Sukhadia A, Upadhyay K, Gundeti M, Shah S, Shah M (2020) Optimization of smart traffic governance system using artificial intelligence. Augment Hum Res 5:13. https://doi.org/10.1007/s41133-020-00035-x

    Article  Google Scholar 

  • Tzounis A, Katsoulas A, Bartzanas T, Kittas C (2017) Internet of things in agriculture, recent advances and future challenges. Biosyst Eng 164:31–48

    Article  Google Scholar 

  • Tiburski RT, Amaral LA, Matos E, Hesse F (2015) The importance of a standard security architecture for SOA-based IoT middleware. EEE Communications Magazine. 1–4

  • Veltri L, Cirani S, Busanelli S, Ferrari G (2013) A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw:1–14

  • Vashi S, Ram J, Modi J, Verma S, Prakash C (2017) A vision, architectural elements, and security issues. International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud, pp 492–496

  • Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A, Jubert IS, Mazura M, Harrison M, Eisenhauer M, Doody P (2009) The cluster of European Research Projects [Online]. Available: http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf. Accessed on Oct. 1, 2013

  • Vijayalakshmi AV, Arockiam L (2016) A study on security issues and challenges in IoT. Int J Eng Sci Manage Res 3(11):34–43

    Google Scholar 

  • Wang X, Zhang J, Schooler EM, Ion M (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. IEEE ICC 2014 - Communication and Information Systems Security Symposium:725–730

  • Yousuf T, Mahmoud R, Aloul F, Zualkernan I (2015) Internet of things (IoT) security: current status, challenges and countermeasures. Int J Inf Secur Res 5(4):608–616

    Google Scholar 

  • Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J:1–10

  • Yan Z, Holtmanns S (2007) Trust modeling and management: from social trust to digital trust”, book chapter of computer security, privacy and politics: Current Issues, Challenges and Solutions, IGI Global. 1–27

  • Yassein MB, Shatnawi MQ, Al-zoubi D (2016) Application layer protocols for the internet of things: a survey. International Conference on Engineering & MIS (ICEMIS) 2016:1–4

  • Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  • Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing 8(6):810–823

    Article  Google Scholar 

  • Zhang B, Ma X, Qin Z (2011) Security architecture on the trusting internet of things. Journal of Electronic Science and Technology 9(4):364–367

    Google Scholar 

  • Zhang Z, Cho MCY, Wang C, Hsu C, Chen C, Shieh S (2014) IEEE 7th International Conference on Service-Oriented Computing and Applications. 230–234

  • Zamfir S, Balan T, Iliescu I, Sandu F (2016) A security analysis on standard IoT protocols. International Conference on Applied and Theoretical Electricity (ICATE):1–6

  • Ziegeldorf JH, Morchon OG, Wehrle K (2013) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7:2728–2742

  • Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727–1765

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful to School of Technology, Pandit Deendayal Petroleum University and LDRP Institute of Technology and Research for the permission to publish this research.

Author information

Authors and Affiliations

Authors

Contributions

All the authors make a substantial contribution in this manuscript. SP and MS participated in drafting the manuscript. SP, and MS wrote the main manuscript, all the authors discussed the results and implication on the manuscript at all stages.

Corresponding author

Correspondence to Manan Shah.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Consent for publication

Not applicable.

Ethics approval and consent to participate

Not applicable.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Panchiwala, S., Shah, M. A Comprehensive Study on Critical Security Issues and Challenges of the IoT World. J. of Data, Inf. and Manag. 2, 257–278 (2020). https://doi.org/10.1007/s42488-020-00030-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42488-020-00030-2

Keywords

Navigation