The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on service providers. However, IoT-based devices may expose a user to various privacy and security threats. Privacypreservation techniques focus on securing any type of data transfer between different parties. We aim to deliver the current state of the art in terms of privacy-preservation techniques used for IoT devices that have been discussed in the literature. Therefore, we carried out a systematic identification of the privacy-preservation techniques for IoT devices that have been described in the cybersecurity domain.To do so, we followed rigorous guidelines to define our research protocol to increase the repeatability and reliability of our results. A set of ten research questions was created to drive the analysis of our study. This research work comprehensively analyzes and discusses the privacy-preservation techniques for IoT devices published in five different academic venues . We identified 260 studies, mostly published between 2017 and 2021, that were systematically selected from an initial set of 1394 papers. The most active research areas in privacy-preservation techniques for IoT devices discuss cryptography techniques to improve the authentication process to access IoT devices. The majority of authors presented privacypreservation techniques for IoT that involved inventory privacy threats and discussed privacy interference attacks. We comprehensively analyze and discuss the trends, gaps, and possible future research directions of the privacy-preservation techniques used for IoT devices published in different academic venues.
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze collected data over the Internet. IoT devices are located in diverse environments and support many applications. To protect IoT systems from cyber threats, Confidentiality, Integrity, and Authentication—the CIA triad—must be supported. However, IoT devices have limited energy and computational resources. Lightweight encryption algorithms have been proposed for IoT, and have been reviewed by previous studies. Some cover communication protocols, while others cover lightweight security or review the challenges in implementing a secure IoT system. The aim of this literature review is to combine the first two topics: communication protocols and lightweight security. They will be approached from a practitioner’s standpoint. Several applications are provided that help readers with a minor background in security to understand these technologies and which elements of the CIA triad have more priority. This paper describes wide-area IoT networks, such as LoRAWAN, Sigfox, and NB-IoT, and their security. It also describes applications throughout the world, and how to enhance their security by implementing emerging lightweight security—specifically, approaches to make well-known ciphers such as Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) more lightweight.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.