Abstract
In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched itself as a global technology. IoT devices are typically integrated with machine learning and artificial intelligence systems to deliver optimal automation. Consequently, IoT has broadened its purview to embrace a wide range of sectors. The advancements in machine learning and artificial intelligence have streamlined the automation of IoT devices. Several IoT applications aim to automate operations and empower inanimate tangible components to operate without any human intervention. The critical factor of IoT security is maintaining users’ confidentiality and privacy, ensuring the security of IoT architectures, gadgets, and records, and assuring the accessibility of IoT ecosystem services. As IoT failures might have serious consequences, it’s vital to examine and research security issues in this sector. The main objective of this research is to enhance the security level of IoT’s architecture. This paper delves into the seven-layer architecture of IoT. Furthermore, the major challenges and issues in IoT's architecture, along with potential countermeasures, have been discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Butun I, Österberg P, Song H (2020) Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor 22(1):616–644
Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294
Sun Y, Song H, Jara AJ, Bie R (2016) Internet of things and big data analytics for smart and connected communities. IEEE Access 4:766–773
Xu Q, Ren P, Song H, Du Q (2017) Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Internet Things J 1–1
State of IoT (2021) Number of connected IoT devices growing Homepage. https://iot-analytics.com/number-connected-iot-devices/#:~:text=IoT%20Chipset%20Market-,State%20of%20IoT%202021%3A%20Number%20of%20connected%20IoT%20devices%20growing,IoT%20now%20surpassing%202%20billion. Last accessed 21 Mar 2022
Kaspersky (2022) Attacks on IoT devices double in a year Homepage. https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/. Last accessed 21 Mar 2022
IoT Security Global Market Report 2022 Homepage. https://www.thebusinessresearchcompany.com/report/iot-security-global-market-report. Last accessed 21 Mar 2022
IoT devices are more vulnerable than ever Homepage. https://www.itpro.com/network-internet/internet-of-things-iot/360850/iot-devices-are-more-vulnerable-than-ever. Last accessed 23 Mar 2022
Sharma V, You I, Kul G (2017) Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (MIST’17). Association for Computing Machinery, New York, NY, USA, pp 81–84
Sovyn Y, Khoma V, Podpora M (2019) Comparison of three CPU-core families for IoT applications in terms of security and performance of AES-GCM. IEEE Internet Things J 7(1):339–348
Rushad M, Nambiar A, Chandavarkar BR (2022) Resource-aware cryptography: an analysis of lightweight cryptographic primitives. SN Comput Sci 3(1):1–12
Report: 57% of IoT devices vulnerable to severe attack homepage. https://www.cepro.com/news/57-percent-iot-devices-vulnerable-attack/#:~:text=Due%20to%20the%20overall%20lack%20of%20security%20measures,exposing%20personal%20and%20confidential%20data%20on%20the%20network. Last accessed 25 Mar 2022
Rajmohan T, Nguyen PH, Ferry N (2022) A decade of research on patterns and architectures for IoT security. Cybersecurity 5:1–29
Al_Barazanchi I, Murthy A, Al Rababah AA, Khader G, Abdulshaheed HR, Rauf HT, Daghighi E, Niu Y (2022) Blockchain technology-based solutions for IOT security. Iraqi J Comput Sci Math 3(1):53–63
Ramadan R (2022) Internet of things (IoT) security vulnerabilities: a review. PLOMS AI 2(1)
Lata N, Kumar R (2022) Security in internet of things (IoT): challenges and models. Math Stat Eng Appl 71(2):75–81
Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting IoT security and privacy through blockchain. Clust Comput 24:1–19
Rondon LP, Babun L, Aris A, Akkaya K, Uluagac AS (2022) Survey on enterprise Internet-of-Things systems (E-IoT): a security perspective. Ad Hoc Netw 125:102728
Ahmad R, Alsmadi I (2021) Machine learning approaches to IoT security: a systematic literature review. Internet Things 14:100365
Hameed A, Alauddin A (2019) Security issues in IoT: a survey. In: 2019 international conference on innovation and intelligence for informatics, computing, and technologies (3ICT). IEEE, pp 1–5
Kumar NM, Mallick PK (2018) The internet of things: insights into the building blocks, component interactions, and architecture layers. Procedia Comput Sci 132:109–117
IoT: Architecture Homepage. https://www.m2mology.com/iot-transformation/iot-world-forum/. Last accessed 23 Mar 2022
Rajmohan T, Nguyen PH, Ferry N (2022) A decade of research on patterns and architectures for IoT security. Cybersecurity 5(2)
Gao B, Bohan L, Xueqi L, Jianshi T, He Q, Huaqiang W (2022) A unified PUF and TRNG design based on 40-nm RRAM with high entropy and robustness for IoT security. IEEE Trans Electron Dev 69(2):536–542
Yeh HL, Chen T‐H, Liu P‐C, Kim T‐H, Wei H‐W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11:4767–4779
Alizadeh M, Salleh M, Zamani M, Shayan J, Karamizadeh S (2012) Security and performance evaluation of lightweight cryptographic algorithms in RFID, pp 45–50
Avoine G, Bingöl M, Carpent X, Ors B (2013) Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. Mob Comput IEEE Trans 12:2037–2049
Migault D, Palomares D, Herbert E, You W, Ganne G, Arfaoui G, Laurent M (2012) E2E: an optimized IPsec architecture for secure and fast offload, pp 365–374
Vasilomanolakis E, Daubert J, Luthra M, Gazis E, Wiesmaier A, Kikiras P (2015) On the security and privacy of internet of things architectures and systems
Mo Y, Kim THJ, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2011) Cyber–physical security of a smart grid infrastructure. Proc IEEE 100:195–209
Baccelli F, El Gamal A, David NC (2011) Interference networks with point-to-point codes. IEEE Trans Inf Theory 57(5):2582–2596
Parvathi D, Binu GS, Sajith VS (2019) Energy management techniques in WSN: a brief review. Int J Sci Technol Res 8(10)
Sivaraju S, Umamaheswari G (2011) Detection of sinkhole attack in wireless sensor networks using message digest algorithms, pp 1–6
Daneshmand S, Jafarnia-Jahromi A, Broumandan A, Lachapelle G (2012) A low-complexity GPS anti-spoofing method using a multi-antenna array. vol 2, pp 1233–1243
Chen CM, Lin YH, Lin YC, Sun HM (2011) RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):727–734
Suryotrisongko H, Musashi Y (2019) Review of cybersecurity research topics, taxonomy and challenges: interdisciplinary perspective. In: 2019 IEEE 12th conference on service-oriented computing and applications (SOCA), pp 162–167
Mutti S, Bacis E, Paraboschi S (2015) An SELinux-based intent manager for Android. In: 2015 IEEE conference on communications and network security (CNS), pp 747–748
Majeed U, Khan LU, Yaqoob I, Ahsan Kazmi SM, Salah K, Hong CS (2021) Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J Netw Comput Appl 181:103007
Aggarwal VK, Sharma N, Kaushik I, Bhushan B (2021) Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction. In: IOP conference series: materials science and engineering, vol 1022, no 1. IOP Publishing, p 012103
Fizza K, Banerjee A, Mitra K, Jayaraman PP, Ranjan R, Patel P, Georgakopoulos D (2021) QoE in IoT: a vision, survey and future directions. Discov Internet Things 1(1):1–14
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ansar, S.A., Arya, S., Aggrawal, S., Saxena, S., Kushwaha, A., Pathak, P.C. (2023). Security in IoT Layers: Emerging Challenges with Countermeasures. In: Shukla, P.K., Singh, K.P., Tripathi, A.K., Engelbrecht, A. (eds) Computer Vision and Robotics. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-7892-0_44
Download citation
DOI: https://doi.org/10.1007/978-981-19-7892-0_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7891-3
Online ISBN: 978-981-19-7892-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)