The Internet of Things (IoT) is regarded as the driving force behind the Fourth Industrial Revolution. The convergence of IoT, cloud computing, and smart environments can help ensure people’s well-being. One major problem for IoT networks is protecting privacy and overcoming security threats. This paper discusses security threats across IoT networks, which can lead the researchers to develop and implement industry-wide security standards and certifications. In addition, this paper emphasizes the importance of data protection and discusses the security measures and mitigation approaches to secure personal and sensitive information, as well as other security threats within such environments. As well, the primary objective of this work is to present a contemporary review of the prevailing research areas concerning IoT security, which highlights the recent trends in IoT security, identifies inadequacies in the investigated research publications, and discusses the associated difficulties. That will assist researchers in developing an efficient, scalable, resilient, and precise intrusion detection system for IoT devices to counter large-scale attacks.
References
[1]
Amoo, O.O., Osasona, F., Atadoga, A., Ayinla, B.S., Farayola, O.A. and Abrahams, T.O. (2024) Cybersecurity Threats in the Age of IoT: A Review of Protective Measures. InternationalJournalofScienceandResearchArchive, 11, 1304-1310. https://doi.org/10.30574/ijsra.2024.11.1.0217
[2]
Najmi, K.Y., AlZain, M.A., Masud, M., Jhanjhi, N.Z., Al-Amri, J. and Baz, M. (2023) A Survey on Security Threats and Countermeasures in IoT to Achieve Users Confidentiality and Reliability. MaterialsToday: Proceedings, 81, 377-382. https://doi.org/10.1016/j.matpr.2021.03.417
[3]
IEEE (2019) 2019 International Carnahan Conference on Security Technology (ICCST).
[4]
Khan, Y., Su’ud, M.B.M., Alam, M.M., Ahmad, S.F., Salim, N.A. and Khan, N. (2022) Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications. Electronics, 12, Article No. 88. https://doi.org/10.3390/electronics12010088
[5]
Wheelus, C. and Zhu, X. (2020) IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT, 1, 259-285. https://doi.org/10.3390/iot1020016
[6]
Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Ziörjen, M. and Stiller, B. (2022) Landscape of IoT Security. ComputerScienceReview, 44, Article ID: 100467. https://doi.org/10.1016/j.cosrev.2022.100467
[7]
Harbi, Y., Aliouat, Z., Refoufi, A. and Harous, S. (2021) Recent Security Trends in Internet of Things: A Comprehensive Survey. IEEEAccess, 9, 113292-113314. https://doi.org/10.1109/access.2021.3103725
[8]
Obaidat, M.A., Obeidat, S., Holst, J., Al Hayajneh, A. and Brown, J. (2020) A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers, 9, Article No. 44. https://doi.org/10.3390/computers9020044
[9]
Zaman, S., Alhazmi, K., Aseeri, M.A., Ahmed, M.R., Khan, R.T., Kaiser, M.S., et al. (2021) Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey. IEEEAccess, 9, 94668-94690. https://doi.org/10.1109/access.2021.3089681
[10]
Riyaz Naik, S.M., Nazme, B. and Farooq, S.M. (2018) A Study on Internet of Things (IoT) & Its Security Issues. InternationalJournalofResearchandAnalyticalReviews, 5, 800-803.
[11]
Sarker, I.H., Khan, A.I., Abushark, Y.B. and Alsolami, F. (2022) Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. MobileNetworksandApplications, 28, 296-312. https://doi.org/10.1007/s11036-022-01937-3
[12]
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P. and Sikdar, B. (2019) A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEEAccess, 7, 82721-82743. https://doi.org/10.1109/access.2019.2924045
[13]
Podder, P., Rubaiyat Hossain Mondal, M., Bharati, S. and Kumar Paul, P. (2021) Review on the Security Threats of Internet of Things. International Journal of Computer Applications (IJCA), 176.
[14]
Karie, N.M., Sahri, N.M., Yang, W., Valli, C. and Kebande, V.R. (2021) A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEEAccess, 9, 121975-121995. https://doi.org/10.1109/access.2021.3109886
[15]
Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I. and Guizani, M. (2020) A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEECommunicationsSurveys&Tutorials, 22, 1646-1685. https://doi.org/10.1109/comst.2020.2988293
[16]
Meneghello, F., Calore, M., Zucchetto, D., Polese, M. and Zanella, A. (2019) IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet of Things Journal, 6, 8182-8201.
[17]
Alizadehsani, R., Roshanzamir, M., Izadi, N.H., Gravina, R., Kabir, H.M.D., Nahavandi, D., et al. (2023) Swarm Intelligence in Internet of Medical Things: A Review. Sensors, 23, Article No. 1466. https://doi.org/10.3390/s23031466
[18]
Ahmad, R. and Alsmadi, I. (2021) Machine Learning Approaches to IoT Security: A Systematic Literature Review. InternetofThings, 14, Article ID: 100365. https://doi.org/10.1016/j.iot.2021.100365
[19]
Albalawi, A.M., Almaiah, D., Albalawi, A.M. and Amin Almaiah, M. (2022) Assessing and Reviewing of Cyber-Security Threats, Attacks, Mitigation Techniques in IoT Environment. JournalofTheoreticalandAppliedInformationTechnology, 100, 2988-3011. https://www.researchgate.net/publication/360614150
[20]
Rehman, Z., Gondal, I., Ge, M., Dong, H., Gregory, M. and Tari, Z. (2024) Proactive Defense Mechanism: Enhancing IoT Security through Diversity-Based Moving Target Defense and Cyber Deception. Computers&Security, 139, Article ID: 103685. https://doi.org/10.1016/j.cose.2023.103685
[21]
Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., et al. (2024) Collaborative Threat Intelligence: Enhancing IoT Security through Blockchain and Machine Learning Integration. JournalofKingSaudUniversity—ComputerandInformationSciences, 36, Article ID: 101939. https://doi.org/10.1016/j.jksuci.2024.101939
[22]
Harahsheh, K.M. and Chen, C. (2023) A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers. Informatica, 47. https://doi.org/10.31449/inf.v47i6.4635
[23]
Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S. and Islam, S.M.R. (2024) A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. FutureInternet, 16, Article No. 40. https://doi.org/10.3390/fi16020040
[24]
Singh, N., Buyya, R. and Kim, H. (2024) Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors, 25, Article No. 79. https://doi.org/10.3390/s25010079
[25]
Aziz Al Kabir, M., Elmedany, W. and Sharif, M.S. (2023) Securing IoT Devices against Emerging Security Threats: Challenges and Mitigation Techniques. JournalofCyberSecurityTechnology, 7, 199-223. https://doi.org/10.1080/23742917.2023.2228053
[26]
Burhan, M., Rehman, R.A., Khan, B. and Kim, B. (2018) IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors, 18, Article No. 2796. https://doi.org/10.3390/s18092796