scispace - formally typeset
Journal ArticleDOI

A survey on internet of things security: Requirements, challenges, and solutions

Reads0
Chats0
TLDR
A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.
Abstract
Internet of Things (IoT) is one of the most promising technologies that aims to enhance humans’ quality of life (QoL). IoT plays a significant role in several fields such as healthcare, automotive industries, agriculture, education, and many cross-cutting business applications. Addressing and analyzing IoT security issues is crucial because the working mechanisms of IoT applications vary due to the heterogeneity nature of IoT environments. Therefore, discussing the IoT security concerns in addition to available and potential solutions would assist developers and enterprises to find appropriate and timely solutions to tackle specific threats, providing the best possible IoT-based services. This paper provides a comprehensive study on IoT security issues, limitations, requirements, and current and potential solutions. The paper builds upon a taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer. The main contribution of this survey is classifying the potential IoT security threat and challenges by an architectural view. From there, IoT security challenges and solutions are further grouped by the layered architecture for readers to get a better understanding on how to address and adopt best practices to avoid the current IoT security threats on each layer.

read more

Citations
More filters
Journal ArticleDOI

Machine learning based solutions for security of Internet of Things (IoT): A survey

TL;DR: The architecture of IoT is discussed, following a comprehensive literature review on ML approaches the importance of security of IoT in terms of different types of possible attacks, and ML-based potential solutions for IoT security has been presented and future challenges are discussed.
Journal ArticleDOI

Internet of Things for Current COVID-19 and Future Pandemics: an Exploratory Study.

TL;DR: The role of IoT-based technologies in COVID-19 is surveyed and the state-of-the-art architectures, platforms, applications, and industrial IoT- based solutions combating CO VID-19 in three main phases, including early diagnosis, quarantine time, and after recovery are reviewed.
Journal ArticleDOI

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic

TL;DR: This article designs an approach using advanced deep learning to detect cyber attacks against IoT systems that integrates a set of long short-term memory (LSTM) modules into an ensemble of detectors and evaluates the effectiveness using a real-world data set of Modbus network traffic.
Posted Content

Internet of Things for Current COVID-19 and Future Pandemics: An Exploratory Study

TL;DR: In this paper, the role of IoT-based technologies in COVID-19 and reviews the state-of-the-art architectures, platforms, applications, and industrial IoTbased solutions combating the pandemic in three main phases, including early diagnosis, quarantine time, and after recovery.
Journal ArticleDOI

Federated-Learning-Based Anomaly Detection for IoT Security Attacks

TL;DR: In this article , a federated learning-based anomaly detection approach is proposed to proactively recognize intrusion in IoT networks using decentralized on-device data, which uses federated training rounds on gated recurrent units (GRUs) models and keeps the data intact on local IoT devices by sharing only the learned weights with the central server.
References
More filters
Journal ArticleDOI

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Journal ArticleDOI

Fog and IoT: An Overview of Research Opportunities

TL;DR: This survey paper summarizes the opportunities and challenges of fog, focusing primarily in the networking context of IoT.
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Journal ArticleDOI

DDoS in the IoT: Mirai and Other Botnets

TL;DR: The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.

The OAuth 2.0 Authorization Framework

Dick Hardt
TL;DR: The OAuth 2.0 authorization framework replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.
Related Papers (5)