Skip to main content

Security Issues in Internet of Things (IoT): A Comprehensive Review

  • Conference paper
  • First Online:
New Paradigm in Decision Science and Management

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1005))

Abstract

Internet of things (IoT) as an extension of existing global Internet is supposed to make it possible for device-to-device communication beyond the human-to-human communication pattern of the global Internet. Billions of smart devices connected to IoT environment can communicate among themselves using sensors and actuators that lead to complex security provisioning for efficient communication across IoT globally. In this paper, we detail the major security as well as privacy issues and possible resolution strategies as extracted from the research work of various authors in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Borgia, E.: The internet of things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)

    Article  Google Scholar 

  2. Weber, R.H.: Internet of things–new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  MathSciNet  Google Scholar 

  3. Zafari, F., Papapanagiotou, I., Christidis, K.: Micro-location for internet of things equipped smart buildings. CoRR, vol. Abs/1501.01539 (2015)

    Google Scholar 

  4. Zafari, F., Papapanagiotou, I., Christidis, K.: Microlocation for internet-of-things-equipped smart buildings. IEEE Internet Things J. 3, 96–112 (2016)

    Article  Google Scholar 

  5. Mendez, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security and privacy. Inf. Secur. J. A Glob. Persp., 1–16 (2018)

    Google Scholar 

  6. Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things (SIoT), pp. 35–43, IEEE (2014)

    Google Scholar 

  7. Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things (2015). arXiv preprint, arXiv:1501.02211

  8. Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: The Internet of Things, pp. 389–395, Springer (2010)

    Google Scholar 

  9. Phillips, T., Karygiannis, T., Kuhn, R.: Security standards for the rfid market. IEEE Secur. Priv. 3(6), 85–89 (2005)

    Article  Google Scholar 

  10. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc networks. IEEE commun. Surv. 7(4), 2–28 (2005)

    Article  Google Scholar 

  11. Naeem, T., Loo, K.-K.: Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, vol. 3, no. 1 (2009)

    Google Scholar 

  12. Costantino, L., Buonaccorsi, N., Cicconetti, C., Mambrini, R.: Performance analysis of an LTE gateway for the IoT. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6, IEEE (2012)

    Google Scholar 

  13. Bilogrevic, I., Jadliwala, M., Hubaux, J.-P.: Security issues in next generation mobile networks: LTE and femtocells. In: 2nd International Femtocell Workshop, No. EPFL-POSTER-149153 (2010)

    Google Scholar 

  14. Papapanagiotou, I., Toumpakaris, D., Lee, J., Devetsikiotis, M.: A survey on next generation mobile wimax networks: objectives, features and technical challenges. Commun. Surv. Tutorials IEEE 11(4), 3–18 (2009)

    Article  Google Scholar 

  15. Hasan, S.S., Qadeer, M.A.: Security concerns in wimax. In: First Asian Himalayas International Conference on Internet, 2009. AH-ICI 2009, pp. 1–5, IEEE (2009)

    Google Scholar 

  16. Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: security and privacy. In: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, pp. 642–647, IEEE (2008)

    Google Scholar 

  17. Curran, K., Millar, A., Mc Garvey, C.: Near field communication. Int. J. Electr. Comput. Eng. 2(3), 371 (2012)

    Google Scholar 

  18. Estimote, Estimote Real World Context for Your Apps. http://www.estimote.com. Online; Accessed 26 Sept 2014

  19. Bouhenguel, R., Mahgoub, I., Ilyas, M.: Bluetooth security in wearable computing applications. In: 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 182–186, IEEE (2008)

    Google Scholar 

  20. Ullah, S., Ali, M., Hussain, A., Kwak, K.S.: Applications of UWB Technology (2009). arXiv preprint, arXiv:0911.1681

  21. Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for internet of things: a survey. IEEE Internet Things J. 3(1), 70–95 (2016)

    Article  Google Scholar 

  22. Eisenhauer, M., Rosengren, P., Antolin, P.: Hydra: a development platform for integrating wireless devices and sensors into ambient intelligence systems. In: The Internet of Things, pp. 367–373, Springer (2010)

    Google Scholar 

  23. Costa, N., Pereira, A., Serodio, C.: Virtual machines applied to WSN’s: the state-of-the-art and classification. In: 2007 Second International Conference on Systems and Networks Communications (ICSNC2007), pp. 50–50, IEEE (2007)

    Google Scholar 

  24. Nagy, M., Katasonov, A., Szydlowski, M., Khriyenko, O., Nikitin, S., Terziyan, V.: Challenges of Middleware for the Internet of Things. INTECH Open Access Publisher (2009)

    Google Scholar 

  25. Murphy, A.L., Picco, G.P., Roman, G.-C.: Lime: a middleware for physical and logical mobility. In: 21st International Conference on Distributed Computing Systems, 2001, pp. 524–533, IEEE, 2001

    Google Scholar 

  26. Stanford-Clark, A.N.A.: MQTT version 3.1.1. OASIS Std., Oct 2014

    Google Scholar 

  27. Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 165–172, IEEE (2014)

    Google Scholar 

  28. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  29. Zolanvari, M.: IoT security: a survey. (2015). http://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_sec/index.html

  30. Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things. Int. J. Adv. Netw. Appl. 6(4), 2372–2378 (2015)

    Google Scholar 

  31. Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in Internet of Things: Challenges and Solutions. arXiv preprint arXiv:1608.05187 (2016)

  32. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: A Lightweight Scalable Blockchain for IoT Security and Privacy, pp. 2–17 (2017) arXiv:1712.02969v1cs.CR

  33. Ahmed, A.W., Ahmed, M.M., Khan, O.A., Shah, M.A.: A comprehensive analysis on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl. (IJCSA) 8(7), 489–501 (2017)

    Google Scholar 

  34. Pandey, E., Gupta, V.: An analysis of security issues of internet of things (IoT). Int. J. Adv. Res. Comput. Sci. Softw. Eng. (IJARCSSE) 5(11), 1768–1773 (2015)

    Google Scholar 

  35. Fremantle, P., Scott, P.: A survey of secure middleware for the Internet of Things. PeerJ Comput. Sci. 3, e114 (2017)

    Article  Google Scholar 

  36. Chetan, C., Tejaswini, N.P., Guruprasad, Y.K.: A survey on applications, privacy and security issues in internet of things. Int. J. Adv. Res. Comput. Sci. (IJARCS) 8(5), 2433–2436 (2017)

    Google Scholar 

  37. Satish, K.J., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. (IJCA) 90(11), 20–26 (2014)

    Article  Google Scholar 

  38. Jaychand, Behar N.: A survey on IoT security threats and solutions. Int. J. Innov. Res. Comput. Commun. Eng. (IJIRCCE) 5(3), 5187–5193 (2017)

    Google Scholar 

  39. Fernandes P., Monteiro, A., Lasrado, S.A.: Evolution of internet of things (IoT): security challenges and future scope. Int. J. Latest Trends Eng. Technol. (IJLTET) (Special Issue), 164–169 (2016)

    Google Scholar 

  40. Suchitra, C., Vandana, C.P.: Internet of things and security issues. Int. J. Comput. Sci. Mob. Comput. (IJCSMC) 5(1), 133–139 (2016)

    Google Scholar 

  41. Choudhury, A., Godara, S.: Internet of things: a survey paper on architecture and challenges. Int. J. Eng. Technol. Sci. Res. (IJETSR) 4(6), 442–447 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Reza Hosenkhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hosenkhan, M.R., Pattanayak, B.K. (2020). Security Issues in Internet of Things (IoT): A Comprehensive Review. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_36

Download citation

Publish with us

Policies and ethics