全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Internet of Things Security: Threats, Recent Trends, and Mitigation Approaches

DOI: 10.4236/ait.2025.151001, PP. 1-15

Keywords: Internet of Things (IoT), IoT Security, IoT Security Threats, IoT Security Measures, Mitigation Approaches

Full-Text   Cite this paper   Add to My Lib

Abstract:

The Internet of Things (IoT) is regarded as the driving force behind the Fourth Industrial Revolution. The convergence of IoT, cloud computing, and smart environments can help ensure people’s well-being. One major problem for IoT networks is protecting privacy and overcoming security threats. This paper discusses security threats across IoT networks, which can lead the researchers to develop and implement industry-wide security standards and certifications. In addition, this paper emphasizes the importance of data protection and discusses the security measures and mitigation approaches to secure personal and sensitive information, as well as other security threats within such environments. As well, the primary objective of this work is to present a contemporary review of the prevailing research areas concerning IoT security, which highlights the recent trends in IoT security, identifies inadequacies in the investigated research publications, and discusses the associated difficulties. That will assist researchers in developing an efficient, scalable, resilient, and precise intrusion detection system for IoT devices to counter large-scale attacks.

References

[1]  Amoo, O.O., Osasona, F., Atadoga, A., Ayinla, B.S., Farayola, O.A. and Abrahams, T.O. (2024) Cybersecurity Threats in the Age of IoT: A Review of Protective Measures. International Journal of Science and Research Archive, 11, 1304-1310.
https://doi.org/10.30574/ijsra.2024.11.1.0217
[2]  Najmi, K.Y., AlZain, M.A., Masud, M., Jhanjhi, N.Z., Al-Amri, J. and Baz, M. (2023) A Survey on Security Threats and Countermeasures in IoT to Achieve Users Confidentiality and Reliability. Materials Today: Proceedings, 81, 377-382.
https://doi.org/10.1016/j.matpr.2021.03.417
[3]  IEEE (2019) 2019 International Carnahan Conference on Security Technology (ICCST).
[4]  Khan, Y., Su’ud, M.B.M., Alam, M.M., Ahmad, S.F., Salim, N.A. and Khan, N. (2022) Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications. Electronics, 12, Article No. 88.
https://doi.org/10.3390/electronics12010088
[5]  Wheelus, C. and Zhu, X. (2020) IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT, 1, 259-285.
https://doi.org/10.3390/iot1020016
[6]  Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Ziörjen, M. and Stiller, B. (2022) Landscape of IoT Security. Computer Science Review, 44, Article ID: 100467.
https://doi.org/10.1016/j.cosrev.2022.100467
[7]  Harbi, Y., Aliouat, Z., Refoufi, A. and Harous, S. (2021) Recent Security Trends in Internet of Things: A Comprehensive Survey. IEEE Access, 9, 113292-113314.
https://doi.org/10.1109/access.2021.3103725
[8]  Obaidat, M.A., Obeidat, S., Holst, J., Al Hayajneh, A. and Brown, J. (2020) A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers, 9, Article No. 44.
https://doi.org/10.3390/computers9020044
[9]  Zaman, S., Alhazmi, K., Aseeri, M.A., Ahmed, M.R., Khan, R.T., Kaiser, M.S., et al. (2021) Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey. IEEE Access, 9, 94668-94690.
https://doi.org/10.1109/access.2021.3089681
[10]  Riyaz Naik, S.M., Nazme, B. and Farooq, S.M. (2018) A Study on Internet of Things (IoT) & Its Security Issues. International Journal of Research and Analytical Reviews, 5, 800-803.
[11]  Sarker, I.H., Khan, A.I., Abushark, Y.B. and Alsolami, F. (2022) Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. Mobile Networks and Applications, 28, 296-312.
https://doi.org/10.1007/s11036-022-01937-3
[12]  Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P. and Sikdar, B. (2019) A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access, 7, 82721-82743.
https://doi.org/10.1109/access.2019.2924045
[13]  Podder, P., Rubaiyat Hossain Mondal, M., Bharati, S. and Kumar Paul, P. (2021) Review on the Security Threats of Internet of Things. International Journal of Computer Applications (IJCA), 176.
[14]  Karie, N.M., Sahri, N.M., Yang, W., Valli, C. and Kebande, V.R. (2021) A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access, 9, 121975-121995.
https://doi.org/10.1109/access.2021.3109886
[15]  Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I. and Guizani, M. (2020) A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Communications Surveys & Tutorials, 22, 1646-1685.
https://doi.org/10.1109/comst.2020.2988293
[16]  Meneghello, F., Calore, M., Zucchetto, D., Polese, M. and Zanella, A. (2019) IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet of Things Journal, 6, 8182-8201.
[17]  Alizadehsani, R., Roshanzamir, M., Izadi, N.H., Gravina, R., Kabir, H.M.D., Nahavandi, D., et al. (2023) Swarm Intelligence in Internet of Medical Things: A Review. Sensors, 23, Article No. 1466.
https://doi.org/10.3390/s23031466
[18]  Ahmad, R. and Alsmadi, I. (2021) Machine Learning Approaches to IoT Security: A Systematic Literature Review. Internet of Things, 14, Article ID: 100365.
https://doi.org/10.1016/j.iot.2021.100365
[19]  Albalawi, A.M., Almaiah, D., Albalawi, A.M. and Amin Almaiah, M. (2022) Assessing and Reviewing of Cyber-Security Threats, Attacks, Mitigation Techniques in IoT Environment. Journal of Theoretical and Applied Information Technology, 100, 2988-3011.
https://www.researchgate.net/publication/360614150
[20]  Rehman, Z., Gondal, I., Ge, M., Dong, H., Gregory, M. and Tari, Z. (2024) Proactive Defense Mechanism: Enhancing IoT Security through Diversity-Based Moving Target Defense and Cyber Deception. Computers & Security, 139, Article ID: 103685.
https://doi.org/10.1016/j.cose.2023.103685
[21]  Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., et al. (2024) Collaborative Threat Intelligence: Enhancing IoT Security through Blockchain and Machine Learning Integration. Journal of King Saud UniversityComputer and Information Sciences, 36, Article ID: 101939.
https://doi.org/10.1016/j.jksuci.2024.101939
[22]  Harahsheh, K.M. and Chen, C. (2023) A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers. Informatica, 47.
https://doi.org/10.31449/inf.v47i6.4635
[23]  Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S. and Islam, S.M.R. (2024) A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet, 16, Article No. 40.
https://doi.org/10.3390/fi16020040
[24]  Singh, N., Buyya, R. and Kim, H. (2024) Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors, 25, Article No. 79.
https://doi.org/10.3390/s25010079
[25]  Aziz Al Kabir, M., Elmedany, W. and Sharif, M.S. (2023) Securing IoT Devices against Emerging Security Threats: Challenges and Mitigation Techniques. Journal of Cyber Security Technology, 7, 199-223.
https://doi.org/10.1080/23742917.2023.2228053
[26]  Burhan, M., Rehman, R.A., Khan, B. and Kim, B. (2018) IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors, 18, Article No. 2796.
https://doi.org/10.3390/s18092796

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133