scispace - formally typeset
Open AccessJournal ArticleDOI

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

TLDR
A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
Abstract
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. To this end, several surveys were put forward addressing various IoT-centric topics, including intrusion detection systems, threat modeling, and emerging technologies. In contrast, in this paper, we exclusively focus on the ever-evolving IoT vulnerabilities. In this context, we initially provide a comprehensive classification of state-of-the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by amalgamating, comparing, and contrasting dispersed research contributions. Subsequently, we provide a unique taxonomy, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses. This aims at providing the reader with a multidimensional research perspective related to IoT vulnerabilities, including their technical details and consequences, which is postulated to be leveraged for remediation objectives. Additionally, motivated by the lack of empirical (and malicious) data related to the IoT paradigm, this paper also presents a first look on Internet-scale IoT exploitations by drawing upon more than 1.2 GB of macroscopic, passive measurements’ data. This aims at practically highlighting the severity of the IoT problem, while providing operational situational awareness capabilities, which undoubtedly would aid in the mitigation task, at large. Insightful findings, inferences and outcomes in addition to open challenges and research problems are also disclosed in this paper, which we hope would pave the way for future research endeavors addressing theoretical and empirical aspects related to the imperative topic of IoT security.

read more

Citations
More filters
Journal ArticleDOI

A survey on internet of things security: Requirements, challenges, and solutions

TL;DR: A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.
Journal ArticleDOI

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

TL;DR: This paper consists of two contributions: the primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIeT.
Journal ArticleDOI

The rise of traffic classification in IoT networks: A survey

TL;DR: A taxonomy of the current network traffic classification within the IoT context is presented and commercial and real-world use cases of the IoT traffic classification are exposed and open research issues and challenges in this domain are outlined.
Journal ArticleDOI

5G support for Industrial IoT Applications - Challenges, Solutions, and Research gaps

TL;DR: This paper identifies current research challenges and solutions in relation to 5G-enabled Industrial IoT, based on the initial requirements and promises of both domains, and provides meaningful comparisons for each of these areas to draw conclusions on current research gaps.
Journal ArticleDOI

A Review and State of Art of Internet of Things (IoT)

TL;DR: The utilization of IoT in the cloud, fog, IoT technologies with applications and security is described and IoT architecture for design and development with sensors in 6G is provided.
References
More filters
Journal ArticleDOI

The Internet of Things: A survey

TL;DR: This survey is directed to those who want to approach this complex discipline and contribute to its development, and finds that still major issues shall be faced by the research community.
Journal ArticleDOI

Internet of Things (IoT): A vision, architectural elements, and future directions

TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

The internet of things: a survey

TL;DR: The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Journal ArticleDOI

Internet of Things in Industries: A Survey

TL;DR: This review paper summarizes the current state-of-the-art IoT in industries systematically and identifies research trends and challenges.
Related Papers (5)
Trending Questions (1)
•How does the scalability of security solutions impact their effectiveness, especially in large-scale IoT setups?

The paper does not specifically address the impact of scalability on the effectiveness of security solutions in large-scale IoT setups.