Skip to main content

Security in IoT Layers: Emerging Challenges with Countermeasures

  • Conference paper
  • First Online:
Computer Vision and Robotics

Abstract

In a short timeframe, Internet of Things (IoT) has gained a lot of traction and has entrenched itself as a global technology. IoT devices are typically integrated with machine learning and artificial intelligence systems to deliver optimal automation. Consequently, IoT has broadened its purview to embrace a wide range of sectors. The advancements in machine learning and artificial intelligence have streamlined the automation of IoT devices. Several IoT applications aim to automate operations and empower inanimate tangible components to operate without any human intervention. The critical factor of IoT security is maintaining users’ confidentiality and privacy, ensuring the security of IoT architectures, gadgets, and records, and assuring the accessibility of IoT ecosystem services. As IoT failures might have serious consequences, it’s vital to examine and research security issues in this sector. The main objective of this research is to enhance the security level of IoT’s architecture. This paper delves into the seven-layer architecture of IoT. Furthermore, the major challenges and issues in IoT's architecture, along with potential countermeasures, have been discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Butun I, Österberg P, Song H (2020) Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor 22(1):616–644

    Article  Google Scholar 

  2. Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294

    Google Scholar 

  3. Sun Y, Song H, Jara AJ, Bie R (2016) Internet of things and big data analytics for smart and connected communities. IEEE Access 4:766–773

    Article  Google Scholar 

  4. Xu Q, Ren P, Song H, Du Q (2017) Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Internet Things J 1–1

    Google Scholar 

  5. State of IoT (2021) Number of connected IoT devices growing Homepage. https://iot-analytics.com/number-connected-iot-devices/#:~:text=IoT%20Chipset%20Market-,State%20of%20IoT%202021%3A%20Number%20of%20connected%20IoT%20devices%20growing,IoT%20now%20surpassing%202%20billion. Last accessed 21 Mar 2022

  6. Kaspersky (2022) Attacks on IoT devices double in a year Homepage. https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/. Last accessed 21 Mar 2022

  7. IoT Security Global Market Report 2022 Homepage. https://www.thebusinessresearchcompany.com/report/iot-security-global-market-report. Last accessed 21 Mar 2022

  8. IoT devices are more vulnerable than ever Homepage. https://www.itpro.com/network-internet/internet-of-things-iot/360850/iot-devices-are-more-vulnerable-than-ever. Last accessed 23 Mar 2022

  9. Sharma V, You I, Kul G (2017) Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain. In Proceedings of the 2017 international workshop on managing insider security threats (MIST’17). Association for Computing Machinery, New York, NY, USA, pp 81–84

    Google Scholar 

  10. Sovyn Y, Khoma V, Podpora M (2019) Comparison of three CPU-core families for IoT applications in terms of security and performance of AES-GCM. IEEE Internet Things J 7(1):339–348

    Article  Google Scholar 

  11. Rushad M, Nambiar A, Chandavarkar BR (2022) Resource-aware cryptography: an analysis of lightweight cryptographic primitives. SN Comput Sci 3(1):1–12

    Article  Google Scholar 

  12. Report: 57% of IoT devices vulnerable to severe attack homepage. https://www.cepro.com/news/57-percent-iot-devices-vulnerable-attack/#:~:text=Due%20to%20the%20overall%20lack%20of%20security%20measures,exposing%20personal%20and%20confidential%20data%20on%20the%20network. Last accessed 25 Mar 2022

  13. Rajmohan T, Nguyen PH, Ferry N (2022) A decade of research on patterns and architectures for IoT security. Cybersecurity 5:1–29

    Article  Google Scholar 

  14. Al_Barazanchi I, Murthy A, Al Rababah AA, Khader G, Abdulshaheed HR, Rauf HT, Daghighi E, Niu Y (2022) Blockchain technology-based solutions for IOT security. Iraqi J Comput Sci Math 3(1):53–63

    Google Scholar 

  15. Ramadan R (2022) Internet of things (IoT) security vulnerabilities: a review. PLOMS AI 2(1)

    Google Scholar 

  16. Lata N, Kumar R (2022) Security in internet of things (IoT): challenges and models. Math Stat Eng Appl 71(2):75–81

    Google Scholar 

  17. Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting IoT security and privacy through blockchain. Clust Comput 24:1–19

    Article  Google Scholar 

  18. Rondon LP, Babun L, Aris A, Akkaya K, Uluagac AS (2022) Survey on enterprise Internet-of-Things systems (E-IoT): a security perspective. Ad Hoc Netw 125:102728

    Article  Google Scholar 

  19. Ahmad R, Alsmadi I (2021) Machine learning approaches to IoT security: a systematic literature review. Internet Things 14:100365

    Article  Google Scholar 

  20. Hameed A, Alauddin A (2019) Security issues in IoT: a survey. In: 2019 international conference on innovation and intelligence for informatics, computing, and technologies (3ICT). IEEE, pp 1–5

    Google Scholar 

  21. Kumar NM, Mallick PK (2018) The internet of things: insights into the building blocks, component interactions, and architecture layers. Procedia Comput Sci 132:109–117

    Article  Google Scholar 

  22. IoT: Architecture Homepage. https://www.m2mology.com/iot-transformation/iot-world-forum/. Last accessed 23 Mar 2022

  23. Rajmohan T, Nguyen PH, Ferry N (2022) A decade of research on patterns and architectures for IoT security. Cybersecurity 5(2)

    Google Scholar 

  24. Gao B, Bohan L, Xueqi L, Jianshi T, He Q, Huaqiang W (2022) A unified PUF and TRNG design based on 40-nm RRAM with high entropy and robustness for IoT security. IEEE Trans Electron Dev 69(2):536–542

    Article  Google Scholar 

  25. Yeh HL, Chen T‐H, Liu P‐C, Kim T‐H, Wei H‐W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11:4767–4779

    Google Scholar 

  26. Alizadeh M, Salleh M, Zamani M, Shayan J, Karamizadeh S (2012) Security and performance evaluation of lightweight cryptographic algorithms in RFID, pp 45–50

    Google Scholar 

  27. Avoine G, Bingöl M, Carpent X, Ors B (2013) Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography. Mob Comput IEEE Trans 12:2037–2049

    Article  Google Scholar 

  28. Migault D, Palomares D, Herbert E, You W, Ganne G, Arfaoui G, Laurent M (2012) E2E: an optimized IPsec architecture for secure and fast offload, pp 365–374

    Google Scholar 

  29. Vasilomanolakis E, Daubert J, Luthra M, Gazis E, Wiesmaier A, Kikiras P (2015) On the security and privacy of internet of things architectures and systems

    Google Scholar 

  30. Mo Y, Kim THJ, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2011) Cyber–physical security of a smart grid infrastructure. Proc IEEE 100:195–209

    Google Scholar 

  31. Baccelli F, El Gamal A, David NC (2011) Interference networks with point-to-point codes. IEEE Trans Inf Theory 57(5):2582–2596

    Article  MathSciNet  MATH  Google Scholar 

  32. Parvathi D, Binu GS, Sajith VS (2019) Energy management techniques in WSN: a brief review. Int J Sci Technol Res 8(10)

    Google Scholar 

  33. Sivaraju S, Umamaheswari G (2011) Detection of sinkhole attack in wireless sensor networks using message digest algorithms, pp 1–6

    Google Scholar 

  34. Daneshmand S, Jafarnia-Jahromi A, Broumandan A, Lachapelle G (2012) A low-complexity GPS anti-spoofing method using a multi-antenna array. vol 2, pp 1233–1243

    Google Scholar 

  35. Chen CM, Lin YH, Lin YC, Sun HM (2011) RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans Parallel Distrib Syst 23(4):727–734

    Article  Google Scholar 

  36. Suryotrisongko H, Musashi Y (2019) Review of cybersecurity research topics, taxonomy and challenges: interdisciplinary perspective. In: 2019 IEEE 12th conference on service-oriented computing and applications (SOCA), pp 162–167

    Google Scholar 

  37. Mutti S, Bacis E, Paraboschi S (2015) An SELinux-based intent manager for Android. In: 2015 IEEE conference on communications and network security (CNS), pp 747–748

    Google Scholar 

  38. Majeed U, Khan LU, Yaqoob I, Ahsan Kazmi SM, Salah K, Hong CS (2021) Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J Netw Comput Appl 181:103007

    Google Scholar 

  39. Aggarwal VK, Sharma N, Kaushik I, Bhushan B (2021) Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction. In: IOP conference series: materials science and engineering, vol 1022, no 1. IOP Publishing, p 012103

    Google Scholar 

  40. Fizza K, Banerjee A, Mitra K, Jayaraman PP, Ranjan R, Patel P, Georgakopoulos D (2021) QoE in IoT: a vision, survey and future directions. Discov Internet Things 1(1):1–14

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syed Anas Ansar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ansar, S.A., Arya, S., Aggrawal, S., Saxena, S., Kushwaha, A., Pathak, P.C. (2023). Security in IoT Layers: Emerging Challenges with Countermeasures. In: Shukla, P.K., Singh, K.P., Tripathi, A.K., Engelbrecht, A. (eds) Computer Vision and Robotics. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-7892-0_44

Download citation

Publish with us

Policies and ethics