Intelligent Communication, Control and Devices pp 727-734 | Cite as
A Comprehensive Review on the Issues Related to the Data Security of Internet of Things (IoT) Devices
Abstract
Internet of Things or IoT is an emerging Internet-based structure of various devices that allows exchange, processing and storage of data along with various other applications. With IoT dominating the industrial domains around the world, followed by its increased implementation for completing various task. Furthermore, it is also prone to malicious attacks that show the capability of the IoT devices in terms of security and privacy of the data. Though previous research in this area may have explored and brought forth the security challenges faced by IoT but there are still some gaps remain in a few places. Therefore, it is very important to design such a framework that is having the capability to face the challenges related to security. In this paper, a comprehensive analysis of security threats faced by IoT and the possible solutions are suggested to solve the issues. We ensure to conduct proper research on the legal challenges of IoT. We believe our approach can further help others to solve the threats easily.
Keywords
Internet of Things Data security Communication protocol Wireless networksReferences
- 1.Gubbi, J., et al.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
- 2.Dehury, C.K., Sahoo, P.K.: Design and implementation of a novel service management framework for IoT devices in cloud. J. Syst. Softw. 119, 149–161 (2016)CrossRefGoogle Scholar
- 3.Santoso, F.K., Vun, N.C.: Securing IoT for smart home system. In: 2015 IEEE International Symposium on Consumer Electronics (ISCE). IEEE (2015)Google Scholar
- 4.Sivaraman, V., et al.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE (2015)Google Scholar
- 5.Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
- 6.Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things (2015). arXiv:1501.02211
- 7.Solà Campillo, O.: Security Issues in Internet of Things (2017)Google Scholar
- 8.Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.: Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens. J. 13(10), 3846–3853 (2013)CrossRefGoogle Scholar
- 9.Sicari, S., et al.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRefGoogle Scholar
- 10.Sehgal, A., et al.: Management of resource constrained devices in the Internet of Things. IEEE Commun. Mag. 50(12) (2012)CrossRefGoogle Scholar
- 11.Suo, H., et al.: Security in the Internet of Things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). IEEE (2012)Google Scholar
- 12.Baccelli, E., et al.: RIOT OS: towards an OS for the Internet of Things. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE (2013)Google Scholar
- 13.Raza, S.: Lightweight Security Solutions for the Internet of Things. Mälardalen University, Västerås, Sweden (2013)Google Scholar
- 14.Weber, R.H.: Internet of Things—new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)MathSciNetCrossRefGoogle Scholar
- 15.Covington, M.J., Carskadden, R.: Threat implications of the Internet of Things. In: 2013 5th International Conference on Cyber Conflict (CyCon). IEEE (2013)Google Scholar