Journal ArticleDOI
A survey on internet of things security: Requirements, challenges, and solutions
Hamed HaddadPajouh,Ali Dehghantanha,Reza M. Parizi,Mohammed Aledhari,Hadis Karimipour +4 more
- Vol. 14, pp 100129
Reads0
Chats0
TLDR
A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.Abstract:
Internet of Things (IoT) is one of the most promising technologies that aims to enhance humans’ quality of life (QoL). IoT plays a significant role in several fields such as healthcare, automotive industries, agriculture, education, and many cross-cutting business applications. Addressing and analyzing IoT security issues is crucial because the working mechanisms of IoT applications vary due to the heterogeneity nature of IoT environments. Therefore, discussing the IoT security concerns in addition to available and potential solutions would assist developers and enterprises to find appropriate and timely solutions to tackle specific threats, providing the best possible IoT-based services. This paper provides a comprehensive study on IoT security issues, limitations, requirements, and current and potential solutions. The paper builds upon a taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer. The main contribution of this survey is classifying the potential IoT security threat and challenges by an architectural view. From there, IoT security challenges and solutions are further grouped by the layered architecture for readers to get a better understanding on how to address and adopt best practices to avoid the current IoT security threats on each layer.read more
Citations
More filters
Journal ArticleDOI
Machine learning based solutions for security of Internet of Things (IoT): A survey
TL;DR: The architecture of IoT is discussed, following a comprehensive literature review on ML approaches the importance of security of IoT in terms of different types of possible attacks, and ML-based potential solutions for IoT security has been presented and future challenges are discussed.
Journal ArticleDOI
Internet of Things for Current COVID-19 and Future Pandemics: an Exploratory Study.
Mohammad Nasajpour,Seyedamin Pouriyeh,Reza M. Parizi,Mohsen Dorodchi,Maria Valero,Hamid R. Arabnia +5 more
TL;DR: The role of IoT-based technologies in COVID-19 is surveyed and the state-of-the-art architectures, platforms, applications, and industrial IoT- based solutions combating CO VID-19 in three main phases, including early diagnosis, quarantine time, and after recovery are reviewed.
Journal ArticleDOI
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
TL;DR: This article designs an approach using advanced deep learning to detect cyber attacks against IoT systems that integrates a set of long short-term memory (LSTM) modules into an ensemble of detectors and evaluates the effectiveness using a real-world data set of Modbus network traffic.
Posted Content
Internet of Things for Current COVID-19 and Future Pandemics: An Exploratory Study
Mohammad Nasajpour,Seyedamin Pouriyeh,Reza M. Parizi,Mohsen Dorodchi,Maria Valero,Hamid R. Arabnia +5 more
TL;DR: In this paper, the role of IoT-based technologies in COVID-19 and reviews the state-of-the-art architectures, platforms, applications, and industrial IoTbased solutions combating the pandemic in three main phases, including early diagnosis, quarantine time, and after recovery.
Journal ArticleDOI
Federated-Learning-Based Anomaly Detection for IoT Security Attacks
TL;DR: In this article , a federated learning-based anomaly detection approach is proposed to proactively recognize intrusion in IoT networks using decentralized on-device data, which uses federated training rounds on gated recurrent units (GRUs) models and keeps the data intact on local IoT devices by sharing only the learned weights with the central server.
References
More filters
Journal ArticleDOI
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Journal ArticleDOI
Fog and IoT: An Overview of Research Opportunities
Mung Chiang,Tao Zhang +1 more
TL;DR: This survey paper summarizes the opportunities and challenges of fog, focusing primarily in the networking context of IoT.
Journal ArticleDOI
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan,Khaled Salah +1 more
TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Journal ArticleDOI
DDoS in the IoT: Mirai and Other Botnets
TL;DR: The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive distributed denial-of-service attacks.
The OAuth 2.0 Authorization Framework
TL;DR: The OAuth 2.0 authorization framework replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.