2020
DOI: 10.3390/sym12040579
|View full text |Cite
|
Sign up to set email alerts
|

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks

Abstract: Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace. At the same time, security and privacy concerns regarding IoT technologies are also attracting significant attention given the risks that are inherently associated with the respective devices and their numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation. Considering the still heterogeneous nature of the majority of IoT protocols, a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 74 publications
(91 reference statements)
0
11
0
Order By: Relevance
“…The intermediary node is constantly in operation and continuously powered, while the end IoT sensor can go into low power mode to save energy. On the other hand, the Thread protocol does not need an intermediary node to connect to the Internet, but it provides itself an connectivity to any IP-based network, involving Wi-Fi, Ethernet, and the Internet in general [ 22 ]. Attacks on the security of the protocols used for IoT sensors are a real problem.…”
Section: Methodsmentioning
confidence: 99%
“…The intermediary node is constantly in operation and continuously powered, while the end IoT sensor can go into low power mode to save energy. On the other hand, the Thread protocol does not need an intermediary node to connect to the Internet, but it provides itself an connectivity to any IP-based network, involving Wi-Fi, Ethernet, and the Internet in general [ 22 ]. Attacks on the security of the protocols used for IoT sensors are a real problem.…”
Section: Methodsmentioning
confidence: 99%
“…Most existing researches generally pay attention to the energy and power efficiency, and the SHG traffic control issue has not yet been actively considered. The paper [12] conducts a comprehensive and comparative review of the security features offered by the most commonly used or promising wireless personal area network technologies today, namely Bluetooth low energy, ZigBee, Z-Wave, Thread, and EnOcean. This study presents the state-of-the-art regarding the security aspects of each examined protocol, and offers a succinct, but allencompassing, review of the works in the literature investigating certain security weaknesses per protocol.…”
Section: Related Workmentioning
confidence: 99%
“…This study presents the state-of-the-art regarding the security aspects of each examined protocol, and offers a succinct, but allencompassing, review of the works in the literature investigating certain security weaknesses per protocol. The current work can be used as a reference to anyone interested in obtaining a holistic view of the security requirements and potential pitfalls of such IoT protocols, and it is also expected to foster research efforts to the development of security-bydesign solutions in the particular domain [12]. The GHOST -Safe-Guarding Home IoT Environments with Personalized Real-time Risk Control -project aims to develop a reference architecture for securing smart-homes IoT ecosystem [13].…”
Section: Related Workmentioning
confidence: 99%
“…As an emerging and low-cost technology, IoT is prone to cyber-security risks and thus the demand for safeguarding such ecosystem is constantly growing. Furthermore, the heterogeneity and diversity of the IoT devices, as well as the new lightweight communication protocols [ 4 ] suitable for the restricted resource and low-energy IoT installations, create new challenges for the protection of such systems.…”
Section: Introductionmentioning
confidence: 99%