2020
DOI: 10.3390/computers9020044
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

Abstract: The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 58 publications
(35 citation statements)
references
References 179 publications
(511 reference statements)
0
35
0
Order By: Relevance
“…Mendez Mena et al [28] focused on IoT architectures but did not consider applications. Obaidat et al [32] aimed to comprehensively cover IoT security but omitted related applications. In contrast, Hassija et al [29] did not cover IoT as a whole, focusing only on applications.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…Mendez Mena et al [28] focused on IoT architectures but did not consider applications. Obaidat et al [32] aimed to comprehensively cover IoT security but omitted related applications. In contrast, Hassija et al [29] did not cover IoT as a whole, focusing only on applications.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…Due to security reasons, a new layer was introduced to IoT architecture and this layer is the Middleware layer. Figure 5 shows the four-layer architecture with characteristics [17], [34,35].…”
Section: Over Of Iot Scope and Iot Architecturementioning
confidence: 99%
“…Attackers can use sensors to inject malicious code and activate it to capture sensitive data exchanged between different IoT devices. If sensors are located in open locations so that attackers can do side-channel attacks which are based on electromagnetic field monetization, power consumption monetization or timing monetization to attack different encryption mechanisms or they can inject noise to the signals [22] [35]. An attacker can also data manipulate at sensors, can do boot attacks, can capture a Node [18].…”
Section: Sensing Layer Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Insecure authentication, insufficient cryptography, and insecure authorization are among the most common issues found with many of these applications [ 2 ]. Moreover, with the explosive proliferation of the Internet of Things (IoT) devices in our daily lives, this has created an Internet of Vulnerabilities (IoV) [ 3 , 4 , 5 ]. Some studies have proposed outsourcing an authentication mechanism that requires IoT RFID-based devices to use a server on the edge of the network to complete the verification and the authentication process [ 5 ], which provides an increasingly secure communications by measuring four different security factors.…”
Section: Introductionmentioning
confidence: 99%