Abstract
The Internet of Things (IoT) expected for infinite connectivity among various elements or “things”. It converges with interpersonal organizations, enabling individuals and gadgets to collaborate, and facilitating data sharing. However, security and protection issues are an incredible test for IoT, yet they are likewise empowering components to make a “trust environment”. The inherent vulnerabilities of IoT gadgets, with restricted assets and heterogeneous innovations, together with the absence of specifically planned IoT models, representable to reproduce ground for the development of specific digital dangers. In this paper, we begin with the three main key layers of the IoT system model: 1) perception; 2) network; and 3) application levels and continue on with information security-related challenges that IoT will encounter. Finally, as a result of the examination, authors will highlight the most critical issues with the point of managing future research directions.
Similar content being viewed by others
Data Availability
All relevant data and material are presented in the main paper.
References
Ahmed AW, Ahmed MM, Khan OA, Shah MA (2017) A comprehensive analysis on the security threats and their countermeasures of IoT. Int J Adv Comput Sci Appl 8(7):489–501
Aazam M, Hung PP, Huh E (2014) Cloud of things: integrating internet of things with cloud computing and the issues involved. Proceedings of International Bhurban Conference on Applied Sciences & Technology, pp 1–6
Adnan AH, Abdirazak M, Sadi ABMS, Anam S, Khan SZ, Rahman MM, Omar MM A comparative study of WLAN security protocols: WPA, WPA2. Proceedings of 2015 3rd International Conference on Advances in Electrical Engineering:165–169
Ahamed J, Rajan AV (2016) Internet of things (IoT): application systems and security vulnerabilities. IEEE:1–5
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Communication Surveys & Tutorials 17(4):2347–2376
Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. IEEE Symposium on Computers and Communication (ISCC) Larnaca 2015:180–187
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw:1–19
Abbasi MA, Memon ZA, Syed TQ, Memon J, Alshboul R (2017) Addressing the future data management challenges in IoT: a proposed framework. Int J Adv Comput Sci Appl 8(5):197–207
Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and open issues. International Conference on Privacy and Security in Mobile Systems (PRISMS):1–8
Ahir K, Govani K, Gajera R, Shah M (2020) Application on virtual reality forenhanced education learning. Military Training and Sports Augmented Human Research 5:7
Balte A, Kashid A, Patil B (2015) Security issues in internet of things (IoT): a survey. International Journal of Advanced Research in Computer Science and Software Engineering 5(4):450–455
Bao F (2013) Dynamic trust management for mobile networks and its applications. 1–188
Bertino E (2016) Data security and privacy in the IoT. Open Proceedings:1–3
Brech B, Jamison J, Shao L, Whightwick G (2013) The interconnecting of everything. 1–6
Bowers KD, Juels A, Oprea A (2008) HAIL: a high-availability and integrity layer for cloud storage. International Association for Cryptographic Research:187–198
Bhabad MA, Bagade ST (2015) Internet of things: architecture, security issues and countermeasures. Int J Comput Appl. 125(14):1–4
Blackstock M, Lea R (2012) IoT mashups with the WoTKit. 3rd IEEE International Conference on the Internet of Things:159–166
Babar S, Mahalle P, Stango A, Prasad N, Prasad R (2010) In: Meghanathan N et al (eds) Proposed security model and threat taxonomy for the internet of things (IoT), vol 89. CNSA 2010, CCIS, pp 420–429
Cai L, Zhu Y (2015) The challenges of data quality and data quality assessment in the big data era. Data Sci J 14(2):1–10
Chakrabarty S, Engels DW (2016) Black networks for bluetooth low energy. 2016 IEEE International Conference on Consumer Electronics (ICCE), pp 11–14
Colakovi A, Hadžialic M (2018) Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39
Castelfranchi C, Falcone R (2000) Trust is much more than subjective probability: mental components and sources of trust. Proceedings of the 33rd Hawaii International Conference on System Sciences:1–10
Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of things security and forensics: challenges and opportunities. Future Gener Comp Sy 78(2):544–546
Cerf VG (2015) Access control and the internet of things. Backspace, IEEE, Internet Computing:96–97
Ferraiolo DF, Cugini JA, Kuhn DR (1995) Role-based access control: features and motivations. Proceedings of the 11th Annual Computer Security Applications Conference:241–248
Frustaci M, Pace P, Aloi G, Fortino G (2018) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J 5(4):2483–2495
Falk J, Björk S (2000) Privacy and information integrity in wearable computing and ubiquitous computing. Extended Abstracts on Human Factors in Computing Systems:177–178
Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (IoT). Int J Comput Appl 111(7):1–6
Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Ind Inf 10(2):1596–1605
Gilgor VD, Wing JM (2011) Towards a theory of trust in networks of humans and computers (CMU-CyLab-11-016). Carnegie Mellon University Research Showcase. Presented at the 19th International Workshop on Security Protocols, Cambridge, UK, 1–21
Gambetta D (2000) ‘Can we trust?’, In Gambetta, Diego (ed.) Trust: making and breaking cooperative relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213–237
Ghorbani HR, Ahmadzadegan MH (2017) Security challenges in internet of things: survey. IEEE Conference on Wireless Sensors:6–11
Gupta R, Gupta R (2016) ABC of internet of things: advancements, benefits, challenges, enablers and facilities of IoT. Symposium on Colossal Data Analysis and Networking:1–5
Granjal J, Monterio E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17(3):1294–1312
Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58:1189–1205
Gelogo YE, Caytiles RD, Park B (2011) Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security. Int J Control and Autom 4(4):179–184
Gessner D, Olivereau A, Segura AS, Serbanati A (2012) Trustworthy infrastructure services for a secure and privacy-respecting internet of things. IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications:998–1003
Gu L, Wang J, Sun B (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156
Gandhi M, Kamdar J, Shah M (2020) Preprocessing of non-symmetrical images for edge detection. Augment Hum Res 5:10. https://doi.org/10.1007/s41133-019-0030-5
Hennebert C, Santos JD (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398
Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services:21–28
Joshitta RSM, Arockiam L (2016) Security in IoT environment: a survey. Int J Inf Technol Mech Eng 2(7):1–8
Jha K, Doshi A, Patel P, Shah M (2019) A comprehensive review on automation in agriculture using artificial intelligence. Artificial Intelligence in Agriculture 2:1–12
Jani K, Chaudhuri M, Patel H, Shah M (2019) Machine learning in films: an approach towards automation in film censoring. J of Data, Inf and Manag. https://doi.org/10.1007/s42488-019-00016-9
Kumar JS, Patel DR (2014) A survey on internet of things: security and privacy issues. Int J Comput Appl 90(11):20–26
Khan MA, Salah K (2018) IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411
Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. 10th International Conference on Frontiers of Information Technology (FIT): Proceedings:257–260
Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale and Multidiscip Model Exp and Des:1–16. https://doi.org/10.1007/s41939-019-00049-y
Kundalia K, Patel Y, Shah M (2020) Multi-label movie genre detection from a movie poster using knowledge transfer learning. Augment Hum Res 5:11. https://doi.org/10.1007/s41133-019-0029-y
Lopez J, Roman R, Alcaraz C (2009) Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: Aldini A, Barthe G, Gorrieri R (eds) Foundations of security analysis and design V. FOSAD 2009, FOSAD 2007, FOSAD 2008, vol 5705. Lecture Notes in Computer Science, pp 1–50
Liu J, Li X, Chen X, Zhen Y, Zeng L (2011) Application of internet of things on smart grid in China. 13th International Conference on Advanced Communication Technology (ICACT2011), pp 13–17
Luo W, Bai G (2011) Ensuring the data integrity in cloud data storage. IEEE International Conference on Cloud Computing and Intelligence Systems 240–243
Maple C (2017) Security and privacy in the internet of things. J Cyber Policy 2(2):155–184
Mahalle P, Babar S, Prasad NR, Prasad R (2010) Identity management framework towards internet of things (IoT): roadmap and key challenges. In: Meghanathan N., Boumerdassi S., Chaki N., Nagamalai D. (eds) Recent trends in network security and applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10:1497–1516
Neeraj SA (2016) Internet of things and trust management in IoT – review. Int Res J Eng Technol 3(6):761–767
Neisse R, Steri G, Baldini G (2014) Enforcement of security policy rules for the internet of things. IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications:165–172
Patra L, Rao UP (2016) Internet of things – architecture, applications, security and other major challenges. Proceedings of the 10th INDIACom; INDIACom-2016; IEEE 3rd International Conference on “Computing for Sustainable Global Development”:1894–1899
Perera C, Zaslavsky A, Georgakopoulos D (2013) Context aware computing for the internet of things: a survey. IEEE Communications Surveys & Tutorials 16(1):414–454
Patel D, Shah Y, Thakkar N, Shah K, Shah M (2020a) Implementation of artificial intelligence techniques for cancer detection. Augment Hum Res 5(1). https://doi.org/10.1007/s41133-019-0024-3
Parekh V, Shah D, Shah M (2020) Fatigue detection using artificial intelligence framework. Augmented Human Research 5:5
Patel D, Shah D, Shah M (2020b) The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports. Ann Data Sci. https://doi.org/10.1007/s40745-019-00239-y
Pandya R, Nadiadwala S, Shah R, Shah M (2020) Build out of methodology for meticulous diagnosis of K-complex in EEG for aiding the detection of alzheimer’s by artificial intelligence. Augment Human Res https://link.springer.com/article/10.1007/s41133-019-0021-6
Qu Y, Chan P (2016) Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems. IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, IEEE International Conference on Intelligent Data and Security:42–48
Rahman RA, Shah B (2016) Security analysis of IoT protocols: a focus in CoAP. 3rd MEC International Conference on Big Data and Smart City:1–7
Razzaq MA, Qureshi MA, Gill SH, Ullah S (2017) Security issues in the internet of things (IoT): a comprehensive study. Int J Adv Comput Sci Appl 8(6):383–388
Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: DCOSS, 2013, Boston, pp 351, hal-00868362f–355. https://doi.org/10.1109/DCOSS.2013.78
Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sensors J 13(10):3711–3720
Sulaiman AG, Al Shaikhli IF (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. Int J Comput Sci Telecommun 5(7):7–10
Sedrati A, Mezrioui A (2018) A survey of security challenges in internet of things. Adv Sci Tech Eng Syst 3(1):274–280
Singh D, Tripathi G, Jara AJ (2014) A survey of internet-of-things: future vision, architecture, challenges and services. IEEE World Forum on Internet of Things, pp 287–292
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. International Conference on Computer Science and Electronics Engineering:648–651
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164
Sheng Z, Yang S, Yu Y, Vasilakos AV, Mccann JA, Leung KK (2013) IEEE wireless. Communications. 91–98
Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for internet of things. Fifth International Conference on Communication Systems and Network Technologies:746–751
Suhail S, Ahmad ZU, Zafar F, Khan A (2016) Introducing secure provenance in IoT: requirements and challenges. International Workshop on Secure Internet of Things:39–46
Shah G, Shah A, Shah M (2019) Panacea of challenges in real-world application of big data analytics in healthcare sector. Data Inf and Manag:1–10. https://doi.org/10.1007/s42488-019-00010-1
Shah D, Dixit R, Shah A, Shah P, Shah M (2020a) A comprehensive analysis regarding several breakthroughs based on computer intelligence targeting various syndromes. Augment Hum Res 5:14. https://doi.org/10.1007/s41133-020-00033-z
Shah K, Patel H, Sanghvi D, Shah M (2020b) A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment Hum Res 5:12. https://doi.org/10.1007/s41133-020-00032-0
Sukhadia A, Upadhyay K, Gundeti M, Shah S, Shah M (2020) Optimization of smart traffic governance system using artificial intelligence. Augment Hum Res 5:13. https://doi.org/10.1007/s41133-020-00035-x
Tzounis A, Katsoulas A, Bartzanas T, Kittas C (2017) Internet of things in agriculture, recent advances and future challenges. Biosyst Eng 164:31–48
Tiburski RT, Amaral LA, Matos E, Hesse F (2015) The importance of a standard security architecture for SOA-based IoT middleware. EEE Communications Magazine. 1–4
Veltri L, Cirani S, Busanelli S, Ferrari G (2013) A novel batch-based group key management protocol applied to the internet of things. Ad Hoc Netw:1–14
Vashi S, Ram J, Modi J, Verma S, Prakash C (2017) A vision, architectural elements, and security issues. International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud, pp 492–496
Vermesan O, Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Bassi A, Jubert IS, Mazura M, Harrison M, Eisenhauer M, Doody P (2009) The cluster of European Research Projects [Online]. Available: http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf. Accessed on Oct. 1, 2013
Vijayalakshmi AV, Arockiam L (2016) A study on security issues and challenges in IoT. Int J Eng Sci Manage Res 3(11):34–43
Wang X, Zhang J, Schooler EM, Ion M (2014) Performance evaluation of attribute-based encryption: toward data privacy in the IoT. IEEE ICC 2014 - Communication and Information Systems Security Symposium:725–730
Yousuf T, Mahmoud R, Aloul F, Zualkernan I (2015) Internet of things (IoT) security: current status, challenges and countermeasures. Int J Inf Secur Res 5(4):608–616
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J:1–10
Yan Z, Holtmanns S (2007) Trust modeling and management: from social trust to digital trust”, book chapter of computer security, privacy and politics: Current Issues, Challenges and Solutions, IGI Global. 1–27
Yassein MB, Shatnawi MQ, Al-zoubi D (2016) Application layer protocols for the internet of things: a survey. International Conference on Engineering & MIS (ICEMIS) 2016:1–4
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing 8(6):810–823
Zhang B, Ma X, Qin Z (2011) Security architecture on the trusting internet of things. Journal of Electronic Science and Technology 9(4):364–367
Zhang Z, Cho MCY, Wang C, Hsu C, Chen C, Shieh S (2014) IEEE 7th International Conference on Service-Oriented Computing and Applications. 230–234
Zamfir S, Balan T, Iliescu I, Sandu F (2016) A security analysis on standard IoT protocols. International Conference on Applied and Theoretical Electricity (ICATE):1–6
Ziegeldorf JH, Morchon OG, Wehrle K (2013) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7:2728–2742
Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727–1765
Acknowledgements
The authors are grateful to School of Technology, Pandit Deendayal Petroleum University and LDRP Institute of Technology and Research for the permission to publish this research.
Author information
Authors and Affiliations
Contributions
All the authors make a substantial contribution in this manuscript. SP and MS participated in drafting the manuscript. SP, and MS wrote the main manuscript, all the authors discussed the results and implication on the manuscript at all stages.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Consent for publication
Not applicable.
Ethics approval and consent to participate
Not applicable.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Panchiwala, S., Shah, M. A Comprehensive Study on Critical Security Issues and Challenges of the IoT World. J. of Data, Inf. and Manag. 2, 257–278 (2020). https://doi.org/10.1007/s42488-020-00030-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42488-020-00030-2