Skip to main content

Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends

  • Chapter
  • First Online:
Data Analytics for Internet of Things Infrastructure

Part of the book series: Internet of Things ((ITTCC))

  • 257 Accesses

Abstract

In recent years, the world has been moving toward connected smart and integrated devices like the Internet of Things (IoT), where devices communicate with each other with sensing and actuating capabilities. The diverse nature and wide range of applications raise various security issues and make these networks vulnerable. Beginning with an overview of the distributed applications of IoT, this chapter then presents various security issues, which are divided into layers. Various types of security attacks and threats are discussed to elaborate on the security problems in IoT networks. This chapter also covers security challenges and their countermeasures. Moreover, the chapter lays out the existing security models and solutions. The last section concludes the chapter by detailing many of the future trends in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

    Article  Google Scholar 

  2. Abbasnejad, E., Abdelrasoul, M., Abdou, A., Acquaviva, A., Ahmadinia, A., Ali, S., Ban, Y., Barnawi, A., Beckmann, K., & Bellizia, D. (2018). 2017 Index IEEE transactions on emerging topics in computing Vol. 5. IEEE Transactions on Emerging Topics in Computing, 6(1), 1.

    Article  Google Scholar 

  3. Qureshi, K. N., Kaiwartya, O., Jeon, G., & Piccialli, F. (2021). Neurocomputing for Internet of Things: Object Recognition and Detection Strategy. Neurocomputing, 485, 263.

    Article  Google Scholar 

  4. Tewari, A., & Gupta, B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems.

    Google Scholar 

  5. Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017). Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 492–496). IEEE.

    Google Scholar 

  6. Silva, B. N., Khan, M., & Han, K. (2018). Internet of things: A comprehensive review of enabling technologies, architecture, and challenges. IETE Technical Review, 35(2), 205–220.

    Article  Google Scholar 

  7. Silva, D. R., Nogueira, M. B., Rodrigues, M. C., Costa, J. S., Silveira, D. V., & Oliveira, G. M. (2019). A concrete architecture for smart solutions based on IoT technologies. IEEE Instrumentation & Measurement Magazine, 22(2), 52–59.

    Article  Google Scholar 

  8. Alnoman, A., Sharma, S. K., Ejaz, W., & Anpalagan, A. (2019). Emerging edge computing technologies for distributed IoT systems. IEEE Network, 33, 140.

    Article  Google Scholar 

  9. Qureshi, K. N., Sikandar, A., & Dhawankar, P. (2022). Next-generation connected traffic using UAVs/drones. In Secure and digitalized future mobility: Shaping the ground and air vehicles cooperation, p. 65.

    Google Scholar 

  10. Qureshi, K. N., Alhudhaif, A., Haider, S. W., Majeed, S., & Jeon, G. (2022). Secure data communication for wireless mobile nodes in intelligent transportation systems. Microprocessors and Microsystems, 104501. https://doi.org/10.1016/j.micpro.2022.104501

  11. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.

    Article  Google Scholar 

  12. Ahmad, M., Younis, T., Habib, M. A., Ashraf, R., & Ahmed, S. H. (2019). A review of current security issues in Internet of Things. In Recent trends and advances in wireless and IoT-enabled networks (pp. 11–23). Springer.

    Chapter  Google Scholar 

  13. Kalita, A. Internet of Things, 2017.

    Google Scholar 

  14. Yashaswini, J. (2017). A review on IoT security issues and countermeasures. Oriental Journal of Computer Science and Technology, 10, 454.

    Article  Google Scholar 

  15. Khalaf, R. H., & Mohammed, A. H. (2018). Confidentiality and integrity of sensing data transmission in IoT application. International Journal of Engineering & Technology, 7(4.25), 240–245.

    Google Scholar 

  16. Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things, arXiv preprint arXiv:1501.02211.

    Google Scholar 

  17. Swamy, S. N., Jadhav, D., & Kulkarni, N. (2017). Security threats in the application layer in IOT applications. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 477–480). IEEE.

    Google Scholar 

  18. Xiao, W., Miao, Y., Fortino, G., Wu, D., Chen, M., & Hwang, K. (2022). Collaborative cloud-edge service cognition framework for DNN configuration toward smart IIoT. IEEE Transactions on Industrial Informatics, 18(10), 7038–7047. https://doi.org/10.1109/TII.2021.3105399

    Article  Google Scholar 

  19. Erhan, L., Ndubuaku, M.U., Mauro, M.D., Song, W., Chen, M., Fortino, G., Bagdasar, O., & Liotta, A. (2020). Smart anomaly detection in sensor systems: A multi-perspective review. arXiv: Learning.

    Google Scholar 

  20. Fortino, G., Messina, F., Rosaci, D., & Sarné, G. M. L. (2020). Using blockchain in a reputation-based model for grouping agents in the Internet of Things. IEEE Transactions on Engineering Management, 67(4), 1231–1243. https://doi.org/10.1109/TEM.2019.2918162

    Article  Google Scholar 

  21. Morshed, G., & Yuan, L. (2017). Big data in cloud computing: An analysis of issues and challenges. International Journal of Advanced Studies in Computer Science And Engineering, 6(4), 345–350.

    Google Scholar 

  22. Das, M. L. (2015). Privacy and security challenges in Internet of Things. In International conference on distributed computing and internet technology (pp. 33–48). Springer.

    Chapter  Google Scholar 

  23. Valea, E., Da Silva, M., Flottes, M.-L., Di Natale, G., Dupuis, S., & Rouzeyre, B. (2019). Providing confidentiality and integrity in ultra low power IoT devices. In 2019 14th international conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS) (pp. 1–6). IEEE.

    Google Scholar 

  24. Aman, M. N., Sikdar, B., Chua, K. C., & Ali, A. (2018). Low Power Data Integrity in IoT Systems. IEEE Internet of Things Journal, 5(4), 3102–3113.

    Article  Google Scholar 

  25. Xiong, J., Ren, J., Chen, L., Yao, Z., Lin, M., Wu, D., & Niu, B. (2018). Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet of Things Journal, 6(2), 1530–1540.

    Article  Google Scholar 

  26. Mohammed, A. (2017). Security issues in IoT (pp. 933–940). IJSRSET.

    Google Scholar 

  27. Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.

    Article  Google Scholar 

  28. Oracevic, A., Dilek, S., & Ozdemir, S. (2017). Security in internet of things: A survey. In 2017 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1–6). IEEE.

    Google Scholar 

  29. Parashar, A., & Rishishwar, S. (2017). Security challanges in IoT. In 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB) (pp. 446–449). IEEE.

    Chapter  Google Scholar 

  30. Rajan, A., Jithish, J., & Sankaran, S. (2017). Sybil attack in IOT: Modelling and defenses. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 2323–2327). IEEE.

    Chapter  Google Scholar 

  31. Shaikh, F., Bou-Harb, E., Neshenko, N., Wright, A. P., & Ghani, N. (2018). Internet of malicious things: correlating active and passive measurements for inferring and characterizing internet-scale unsolicited IoT devices. IEEE Communications Magazine, 56(9), 170–177.

    Article  Google Scholar 

  32. Gafurov, K., & Chung, T.-M. (2019). Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. Journal of Information Processing Systems, 15(4), 797–819.

    Google Scholar 

  33. Hosenkhan, M. R., & Pattanayak, B. K. (2020). Security issues in Internet of Things (IoT): A comprehensive review. In New paradigm in decision science and management (pp. 359–369). Springer.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashif Naseer Qureshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Qureshi, K.N., Newe, T., Qazi, R., Jeon, G. (2023). Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends. In: Sharma, R., Jeon, G., Zhang, Y. (eds) Data Analytics for Internet of Things Infrastructure. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-33808-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-33808-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-33807-6

  • Online ISBN: 978-3-031-33808-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics