Abstract
In recent years, the world has been moving toward connected smart and integrated devices like the Internet of Things (IoT), where devices communicate with each other with sensing and actuating capabilities. The diverse nature and wide range of applications raise various security issues and make these networks vulnerable. Beginning with an overview of the distributed applications of IoT, this chapter then presents various security issues, which are divided into layers. Various types of security attacks and threats are discussed to elaborate on the security problems in IoT networks. This chapter also covers security challenges and their countermeasures. Moreover, the chapter lays out the existing security models and solutions. The last section concludes the chapter by detailing many of the future trends in IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
Abbasnejad, E., Abdelrasoul, M., Abdou, A., Acquaviva, A., Ahmadinia, A., Ali, S., Ban, Y., Barnawi, A., Beckmann, K., & Bellizia, D. (2018). 2017 Index IEEE transactions on emerging topics in computing Vol. 5. IEEE Transactions on Emerging Topics in Computing, 6(1), 1.
Qureshi, K. N., Kaiwartya, O., Jeon, G., & Piccialli, F. (2021). Neurocomputing for Internet of Things: Object Recognition and Detection Strategy. Neurocomputing, 485, 263.
Tewari, A., & Gupta, B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017). Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 492–496). IEEE.
Silva, B. N., Khan, M., & Han, K. (2018). Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical Review, 35(2), 205–220.
Silva, D. R., Nogueira, M. B., Rodrigues, M. C., Costa, J. S., Silveira, D. V., & Oliveira, G. M. (2019). A concrete architecture for smart solutions based on IoT technologies. IEEE Instrumentation & Measurement Magazine, 22(2), 52–59.
Alnoman, A., Sharma, S. K., Ejaz, W., & Anpalagan, A. (2019). Emerging edge computing technologies for distributed IoT systems. IEEE Network, 33, 140.
Qureshi, K. N., Sikandar, A., & Dhawankar, P. (2022). Next-generation connected traffic using UAVs/drones. In Secure and digitalized future mobility: Shaping the ground and air vehicles cooperation, p. 65.
Qureshi, K. N., Alhudhaif, A., Haider, S. W., Majeed, S., & Jeon, G. (2022). Secure data communication for wireless mobile nodes in intelligent transportation systems. Microprocessors and Microsystems, 104501. https://doi.org/10.1016/j.micpro.2022.104501
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.
Ahmad, M., Younis, T., Habib, M. A., Ashraf, R., & Ahmed, S. H. (2019). A review of current security issues in Internet of Things. In Recent trends and advances in wireless and IoT-enabled networks (pp. 11–23). Springer.
Kalita, A. Internet of Things, 2017.
Yashaswini, J. (2017). A review on IoT security issues and countermeasures. Oriental Journal of Computer Science and Technology, 10, 454.
Khalaf, R. H., & Mohammed, A. H. (2018). Confidentiality and integrity of sensing data transmission in IoT application. International Journal of Engineering & Technology, 7(4.25), 240–245.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things, arXiv preprint arXiv:1501.02211.
Swamy, S. N., Jadhav, D., & Kulkarni, N. (2017). Security threats in the application layer in IOT applications. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 477–480). IEEE.
Xiao, W., Miao, Y., Fortino, G., Wu, D., Chen, M., & Hwang, K. (2022). Collaborative cloud-edge service cognition framework for DNN configuration toward smart IIoT. IEEE Transactions on Industrial Informatics, 18(10), 7038–7047. https://doi.org/10.1109/TII.2021.3105399
Erhan, L., Ndubuaku, M.U., Mauro, M.D., Song, W., Chen, M., Fortino, G., Bagdasar, O., & Liotta, A. (2020). Smart anomaly detection in sensor systems: A multi-perspective review. arXiv: Learning.
Fortino, G., Messina, F., Rosaci, D., & Sarné, G. M. L. (2020). Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Transactions on Engineering Management, 67(4), 1231–1243. https://doi.org/10.1109/TEM.2019.2918162
Morshed, G., & Yuan, L. (2017). Big data in cloud computing: An analysis of issues and challenges. International Journal of Advanced Studies in Computer Science And Engineering, 6(4), 345–350.
Das, M. L. (2015). Privacy and security challenges in Internet of Things. In International conference on distributed computing and internet technology (pp. 33–48). Springer.
Valea, E., Da Silva, M., Flottes, M.-L., Di Natale, G., Dupuis, S., & Rouzeyre, B. (2019). Providing confidentiality and integrity in ultra low power IoT devices. In 2019 14th international conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS) (pp. 1–6). IEEE.
Aman, M. N., Sikdar, B., Chua, K. C., & Ali, A. (2018). Low Power Data Integrity in IoT Systems. IEEE Internet of Things Journal, 5(4), 3102–3113.
Xiong, J., Ren, J., Chen, L., Yao, Z., Lin, M., Wu, D., & Niu, B. (2018). Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet of Things Journal, 6(2), 1530–1540.
Mohammed, A. (2017). Security issues in IoT (pp. 933–940). IJSRSET.
Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.
Oracevic, A., Dilek, S., & Ozdemir, S. (2017). Security in internet of things: A survey. In 2017 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1–6). IEEE.
Parashar, A., & Rishishwar, S. (2017). Security challanges in IoT. In 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 446–449). IEEE.
Rajan, A., Jithish, J., & Sankaran, S. (2017). Sybil attack in IOT: Modelling and defenses. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 2323–2327). IEEE.
Shaikh, F., Bou-Harb, E., Neshenko, N., Wright, A. P., & Ghani, N. (2018). Internet of malicious things: correlating active and passive measurements for inferring and characterizing internet-scale unsolicited IoT devices. IEEE Communications Magazine, 56(9), 170–177.
Gafurov, K., & Chung, T.-M. (2019). Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. Journal of Information Processing Systems, 15(4), 797–819.
Hosenkhan, M. R., & Pattanayak, B. K. (2020). Security issues in Internet of Things (IoT): A comprehensive review. In New paradigm in decision science and management (pp. 359–369). Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Qureshi, K.N., Newe, T., Qazi, R., Jeon, G. (2023). Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends. In: Sharma, R., Jeon, G., Zhang, Y. (eds) Data Analytics for Internet of Things Infrastructure. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-33808-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-33808-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-33807-6
Online ISBN: 978-3-031-33808-3
eBook Packages: Computer ScienceComputer Science (R0)