Skip to main content

A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges

  • Conference paper
  • First Online:
Intelligent System Design

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1171))

Abstract

The Internet of things has changed the technology to a new era, which enhanced our lifestyle. Because of the popularity of IoT in real world, the implementation of IoT in different areas created mislead of malicious access and security issue. Many researchers have studied, explored and opened the problems in security. The IoT is a concept which is an interconnection of our day-to-day devices. Devices are now elegantly communicating to human or each other. Each connected devices are attached to sensors and actuator senses and understands what is going on and performs the task accordingly. This paper discusses the different levels of IoT architecture and vulnerabilities in each level. The IoT devices are securely hackable and negotiable to use as per the requirement of malicious users. In this paper, we discuss the significant issues and challenges in the IoT environment and its communication, security, open problems, and their probable solutions. As the IoT devices are exposed to the vulnerabilities which need to be protected. To protect, we reviewed feasible solutions like use of blockchain, software define network (SDN), by using private and public keys and machine learning and deep learning algorithms to protect data in the cloud and IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things, In IEEE World Congress on Services (pp. 21–28).

    Google Scholar 

  2. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  3. Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.). (2010). The internet of things: 20th Tyrrhenian workshop on digital communications. Springer Science & Business Media.

    Google Scholar 

  4. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.

    Article  Google Scholar 

  5. Khan, A. A., Rehmani, M. H., & Rachedi, A. (2017). Cognitive-radio-based internet of things: Applications, architectures, spectrum-related functionalities, and future research directions. IEEE Wireless Communications, 24(3), 17–25.

    Article  Google Scholar 

  6. Xu, W., Trappe, W., Zhang, Y. & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM

    Google Scholar 

  7. Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.

    Article  Google Scholar 

  8. Chae, S. H., Choi, W., Lee, J. H., & Quek, T. Q. (2014). Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), 1617–1628.

    Google Scholar 

  9. Hong, Y. W. P., Lan, P. C., & Kuo, C. C. J. (2013). Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Processing Magazine, 30(5), 29–40.

    Article  Google Scholar 

  10. Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems.

    Google Scholar 

  11. Jha, S., Kumar, R., Chatterjee, J. M. & Khari, M (2019). Collaborative handshaking approaches between the internet of computing and internet of things towards a smart world: A review from 2009–2017. Telecommunication Systems, 70(4), 617–634.

    Google Scholar 

  12. Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2019). Machine learning in IoT Security: Current solutions and future challenges. arXiv preprint arXiv:1904.05735

  13. Sha, K., Errabelly, R., Wei, W., Yang, T. A., & Wang, Z. (2017). Edges: Design of an edge layer security service to enhance IoT security. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC) (pp. 81–88).

    Google Scholar 

  14. Padhy, N., Panigrahi, R. & Neeraja, K. (2019). Threshold estimation from software metrics by using evolutionary techniques and its proposed algorithms, models. Evolutionary Intelligence. https://doi.org/10.1007/s12065-019-00201-0

  15. Panigrahi, R., Padhy, N., Satapathy, S. C. (2019) Software reusability metrics estimation from the social media by using evolutionary algorithms: Refactoring perspective. International Journal of Open Source Software and Processes (IJOSSP), 10(2) , 21–36, IGI Global.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neelamadhab Padhy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patnaik, R., Padhy, N., Srujan Raju, K. (2021). A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges. In: Satapathy, S., Bhateja, V., Janakiramaiah, B., Chen, YW. (eds) Intelligent System Design. Advances in Intelligent Systems and Computing, vol 1171. Springer, Singapore. https://doi.org/10.1007/978-981-15-5400-1_68

Download citation

Publish with us

Policies and ethics