Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 875))


The Internet of Things (IoT) is an innovative model that combines the physical world with the Internet and turns out to be one of the major hi-tech breakthroughs of computer technology. The low openness and absence of interoperability of a significant number of these gadgets in an enormous region of magnitude will make it extremely hard to plan explicit wellbeing techniques and actualize a particular security strategy for sustainable IoT. Moreover, IoT networks presented are helpless against assaults planned to disturb the organization. Thus, special measures are required to combat the upward security apprehensions in IoT. In this article, these security concerns with respect to different layers of basic architecture of IoT are studied in detail; with other emerging challenges, IoT is facing today.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT : internet of threats ? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 1.

  2. Bhuvaneswari V, Porkodi R (2014) The internet of things (IOT) applications and communication enabling technology standards: an overview. In: Proceedings—2014 International conference on intelligent computing applications ICICA, pp 324–329.

  3. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of IoT-enabled cyberattacks : assessing attack paths to critical infrastructures and services. IEEE Commun Surv Tutorials 1.

  4. Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2018) Anatomy of threats to the internet of things. IEEE Commun Surv Tutorials 1.

  5. Liu L, Xu B, Zhang X, Wu X (2018) An intrusion detection method for internet of things based on suppressed fuzzy clustering. Eurasip J Wirel Commun Netw 1:2018.

    Article  Google Scholar 

  6. Anand P, Singh Y, Selwal A, Singh PK, Felseghi RA, Raboaca MS (2020) IoVT: internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids. Energies 13(18):1–23.

    Article  Google Scholar 

  7. Hameed A (2019) Security issues in IoT : a survey. In: International conference on innovation and intelligence informatics, computing, and technologies, pp 1–5

    Google Scholar 

  8. Mrabet H, Belguith S, Alhomoud A, Jemai A (2020) A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors (Switzerland) 20(13):1–20.

    Article  Google Scholar 

  9. Sarkar C et al (2014) DIAT : a scalable distributed architecture for IoT. X(X):1–10.

  10. Li D, Deng L, Lee M, Wang H (2019) IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int J Inf Manage 49(April):533–545.

    Article  Google Scholar 

  11. Dawoud A, Shahristani S, Raun C (2018) Deep learning and software-defined networks: towards secure IoT architecture. Internet of Things 3–4:82–89.

    Article  Google Scholar 

  12. Lv W, Meng F, Zhang C, Lv Y, Cao N, Jiang J (2017) A general architecture of IoT system. 659–664.

  13. Mathew PS, Pillai AS, Palade V (2018) Applications of IoT in healthcare

    Google Scholar 

  14. Chaudhary S (2019) CRAIoT : concept, review and application (s) of IoT. In: 2019 4th International conference on internet things smart innovation and usages, pp 1–4

    Google Scholar 

  15. Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: Proceedings of the international conference on IoT social mobile, analytics and cloud, I-SMAC, pp 32–37.

  16. Anand P, Singh Y, Selwal A, Alazab M, Member S, Tanwar S (2020) IoT vulnerability assessment for sustainable computing : threats, current solutions, and open challenges. 168825–168853.

  17. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743.

    Article  Google Scholar 

  18. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security : challenges and solutions. Appl Sci 1–17

    Google Scholar 

  19. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things : security vulnerabilities and challenges. pp 180–187

    Google Scholar 

  20. Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world : present and future challenges. 4662.

  21. Mukherjee BA (2015) Physical-layer security in the internet of things : sensing and communication confidentiality under resource constraints. 103(10)

    Google Scholar 

  22. Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in iot-based stateful SDN: an experimental approach. Sensors (Switzerland) 20(3).

  23. Sharma V, You I, Andersson K, Palmieri F, Rehmani MH, Lim J (2020) Security, privacy and trust for smart mobile-internet of things (M-IoT): a survey.

  24. Yugha R, Chithra S (2020) A survey on technologies and security protocols: reference for future generation IoT. J Netw Comput Appl 169:102763.

    Article  Google Scholar 

  25. Tournier J, Lesueur F, Le Mouël F, Guyon L, Ben-Hassine H (2020) A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things 100264.

  26. Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20.

    Article  Google Scholar 

  27. Ibitoye O, Shafiq O, Matrawy A (2019) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. arXiv

    Google Scholar 

  28. Pal S, Hitchens M, Rabehaja T, Mukhopadhyay S (2020) Security requirements for the internet of things: a systematic approach. Sensors (Switzerland) 20(20):1–34.

    Article  Google Scholar 

  29. Nebbione G, Calzarossa MC (2020) Security of IoT application layer protocols : challenges and findings. 1–20.

  30. Obaidat MA, Obeidat S, Holst J, Al Hayajneh A, Brown J (2020) A comprehensive and systematic survey on the internet of things: security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers 9(2).

  31. Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutorials 20(4):3496–3509.

    Article  Google Scholar 

  32. Chen S et al (2020) A vision of IoT : applications, challenges, and opportunities with China perspective. 1(4):349–359

    Google Scholar 

  33. Challenges S (2021) Internet of things: evolution, concerns and security challenges

    Google Scholar 

  34. Farhan L, Alissa AE (2017) A survey on the challenges and opportunities of the internet of things (IoT)

    Google Scholar 

  35. Sengupta J, Ruj S, Das Bit S (2019) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 102481.

  36. Panchiwala S, Shah M (2020) A comprehensive study on critical security issues and challenges of the IoT world

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahad, U., Singh, Y., Anand, P. (2022). Emerging Security Issues in IoT. In: Singh, P.K., Kolekar, M.H., Tanwar, S., Wierzchoń, S.T., Bhatnagar, R.K. (eds) Emerging Technologies for Computing, Communication and Smart Cities. Lecture Notes in Electrical Engineering, vol 875. Springer, Singapore.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0283-3

  • Online ISBN: 978-981-19-0284-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics