Abstract
Internet of things (IoT) as an extension of existing global Internet is supposed to make it possible for device-to-device communication beyond the human-to-human communication pattern of the global Internet. Billions of smart devices connected to IoT environment can communicate among themselves using sensors and actuators that lead to complex security provisioning for efficient communication across IoT globally. In this paper, we detail the major security as well as privacy issues and possible resolution strategies as extracted from the research work of various authors in this field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Borgia, E.: The internet of things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)
Weber, R.H.: Internet of things–new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Zafari, F., Papapanagiotou, I., Christidis, K.: Micro-location for internet of things equipped smart buildings. CoRR, vol. Abs/1501.01539 (2015)
Zafari, F., Papapanagiotou, I., Christidis, K.: Microlocation for internet-of-things-equipped smart buildings. IEEE Internet Things J. 3, 96–112 (2016)
Mendez, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security and privacy. Inf. Secur. J. A Glob. Persp., 1–16 (2018)
Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things (SIoT), pp. 35–43, IEEE (2014)
Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things (2015). arXiv preprint, arXiv:1501.02211
Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: The Internet of Things, pp. 389–395, Springer (2010)
Phillips, T., Karygiannis, T., Kuhn, R.: Security standards for the rfid market. IEEE Secur. Priv. 3(6), 85–89 (2005)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc networks. IEEE commun. Surv. 7(4), 2–28 (2005)
Naeem, T., Loo, K.-K.: Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, vol. 3, no. 1 (2009)
Costantino, L., Buonaccorsi, N., Cicconetti, C., Mambrini, R.: Performance analysis of an LTE gateway for the IoT. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6, IEEE (2012)
Bilogrevic, I., Jadliwala, M., Hubaux, J.-P.: Security issues in next generation mobile networks: LTE and femtocells. In: 2nd International Femtocell Workshop, No. EPFL-POSTER-149153 (2010)
Papapanagiotou, I., Toumpakaris, D., Lee, J., Devetsikiotis, M.: A survey on next generation mobile wimax networks: objectives, features and technical challenges. Commun. Surv. Tutorials IEEE 11(4), 3–18 (2009)
Hasan, S.S., Qadeer, M.A.: Security concerns in wimax. In: First Asian Himalayas International Conference on Internet, 2009. AH-ICI 2009, pp. 1–5, IEEE (2009)
Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: security and privacy. In: Third International Conference on Availability, Reliability and Security, 2008. ARES 08, pp. 642–647, IEEE (2008)
Curran, K., Millar, A., Mc Garvey, C.: Near field communication. Int. J. Electr. Comput. Eng. 2(3), 371 (2012)
Estimote, Estimote Real World Context for Your Apps. http://www.estimote.com. Online; Accessed 26 Sept 2014
Bouhenguel, R., Mahgoub, I., Ilyas, M.: Bluetooth security in wearable computing applications. In: 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies, pp. 182–186, IEEE (2008)
Ullah, S., Ali, M., Hussain, A., Kwak, K.S.: Applications of UWB Technology (2009). arXiv preprint, arXiv:0911.1681
Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S.: Middleware for internet of things: a survey. IEEE Internet Things J. 3(1), 70–95 (2016)
Eisenhauer, M., Rosengren, P., Antolin, P.: Hydra: a development platform for integrating wireless devices and sensors into ambient intelligence systems. In: The Internet of Things, pp. 367–373, Springer (2010)
Costa, N., Pereira, A., Serodio, C.: Virtual machines applied to WSN’s: the state-of-the-art and classification. In: 2007 Second International Conference on Systems and Networks Communications (ICSNC2007), pp. 50–50, IEEE (2007)
Nagy, M., Katasonov, A., Szydlowski, M., Khriyenko, O., Nikitin, S., Terziyan, V.: Challenges of Middleware for the Internet of Things. INTECH Open Access Publisher (2009)
Murphy, A.L., Picco, G.P., Roman, G.-C.: Lime: a middleware for physical and logical mobility. In: 21st International Conference on Distributed Computing Systems, 2001, pp. 524–533, IEEE, 2001
Stanford-Clark, A.N.A.: MQTT version 3.1.1. OASIS Std., Oct 2014
Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 165–172, IEEE (2014)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Zolanvari, M.: IoT security: a survey. (2015). http://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_sec/index.html
Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things. Int. J. Adv. Netw. Appl. 6(4), 2372–2378 (2015)
Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in Internet of Things: Challenges and Solutions. arXiv preprint arXiv:1608.05187 (2016)
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: A Lightweight Scalable Blockchain for IoT Security and Privacy, pp. 2–17 (2017) arXiv:1712.02969v1cs.CR
Ahmed, A.W., Ahmed, M.M., Khan, O.A., Shah, M.A.: A comprehensive analysis on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl. (IJCSA) 8(7), 489–501 (2017)
Pandey, E., Gupta, V.: An analysis of security issues of internet of things (IoT). Int. J. Adv. Res. Comput. Sci. Softw. Eng. (IJARCSSE) 5(11), 1768–1773 (2015)
Fremantle, P., Scott, P.: A survey of secure middleware for the Internet of Things. PeerJ Comput. Sci. 3, e114 (2017)
Chetan, C., Tejaswini, N.P., Guruprasad, Y.K.: A survey on applications, privacy and security issues in internet of things. Int. J. Adv. Res. Comput. Sci. (IJARCS) 8(5), 2433–2436 (2017)
Satish, K.J., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. (IJCA) 90(11), 20–26 (2014)
Jaychand, Behar N.: A survey on IoT security threats and solutions. Int. J. Innov. Res. Comput. Commun. Eng. (IJIRCCE) 5(3), 5187–5193 (2017)
Fernandes P., Monteiro, A., Lasrado, S.A.: Evolution of internet of things (IoT): security challenges and future scope. Int. J. Latest Trends Eng. Technol. (IJLTET) (Special Issue), 164–169 (2016)
Suchitra, C., Vandana, C.P.: Internet of things and security issues. Int. J. Comput. Sci. Mob. Comput. (IJCSMC) 5(1), 133–139 (2016)
Choudhury, A., Godara, S.: Internet of things: a survey paper on architecture and challenges. Int. J. Eng. Technol. Sci. Res. (IJETSR) 4(6), 442–447 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hosenkhan, M.R., Pattanayak, B.K. (2020). Security Issues in Internet of Things (IoT): A Comprehensive Review. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_36
Download citation
DOI: https://doi.org/10.1007/978-981-13-9330-3_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9329-7
Online ISBN: 978-981-13-9330-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)