Skip to main content

IOT Security: Recent Trends and Challenges

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 490))

Abstract

The use of Internet of Things (IoT) devices is increasing day by day along with the increased use of advanced technologies in almost every field. IoT provides technologies like Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) which are used in several applications like forest fires, home automation, military equipment, traffic signals, medical sciences, agriculture, etc. Large amount of information is being obtained by the sensors and then sent to data centers through the transceivers for analysis and decision-making purposes. Based on these decisions, the actuators perform a particular tasks based on the applications. This large amount of data can be used by a third party for malicious purposes, so there is a need for information security almost at every level of IoT. IoT is the kind of technology that involves several fields of computer science at step. With the usage of multiple technologies like Artificial Intelligence, Machine Learning, Data Mining methods, etc., there is a need to provide proper security to the IoT system also. Several layers used in the IoT architecture need to be protected. Hence, there is a need to make a robust system in order to deal with the existing vulnerabilities, threats, attacks, and privacy and security challenges existing in IoT system. This paper discusses the recent trends in the IoT architecture along with acknowledging the threats present in different architecture layers. Along with this, the security threats and challenges are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. In: Signal processing and the Internet of Things, IEEE Signal Processing Magazine, 28 Aug 2018

    Google Scholar 

  2. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security: challenges and solutions. Appl Sci, 15 June 2020

    Google Scholar 

  3. Boehm E (2020) The top Internet of Things (IoT) authentication methods and options, September 2020

    Google Scholar 

  4. Liao B, Ali Y, Nazir S, He L, Khan HU. Security analysis of IoT devices by using mobile computing: a systematic literature review. IEEE Access

    Google Scholar 

  5. Imran MA, Zoha A, Zhang L, Abbasi QH (2020) Grand challenges in IoT and sensor networks. Front Commun Netw

    Google Scholar 

  6. Romana R, Lopeza J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Fut Gener Comput Syst 78(3):680–698

    Article  Google Scholar 

  7. Selvaraj SK, Sundaravaradhan S (2019) Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl Sci 2. Article number: 139

    Google Scholar 

  8. Bodkhe U, Tanwar S (2020) Secure data dissemination techniques for IoT applications: research challenges and opportunities. Wiley Online Library, February 2020

    Google Scholar 

  9. Tiwary A Dr, Mahato M, Chidar A, Chandrol MK, Shrivastava M, Tripathi M. Internet of Things (IoT): research, architectures and applications. Int J Fut Revol Comp Sci Commun Eng 4(3):23–27. ISSN: 2454-4248

    Google Scholar 

  10. Tewari A, Gupta BB (2018) Security, privacy and trust of different layers in Internet-of-things (IoTs) framework. Fut Gener Comp Syst

    Google Scholar 

  11. Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: IEEE, fellow 7th international conference on service-oriented computing and applications

    Google Scholar 

  12. Xu T, Wendt JB, Potkonjak M. Security of IoT systems: design challenges and opportunities

    Google Scholar 

  13. Bodkhe U, Tanwar S (2020) Secure data dissemination techniques for IoT applications: research challenges and opportunities

    Google Scholar 

  14. Yao X, Farhaa F, Lia R, Psychoulab I, Chenb L, Ning H (2020) Security and privacy issues of physical objects in the IoT: challenges and opportunities. Digi Commun Netw. Science Direct, September 2020

    Google Scholar 

  15. Choo KKR, Yan Z, Meng W (2020) Editorial: blockchain in industrial IoT applications: security and privacy advances, challenges, and opportunities. IEEE Trans Ind Inform 16(6):4119–4121. ISSN: 1551-3203

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prachi Dahiya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dahiya, P., Kumar, V. (2023). IOT Security: Recent Trends and Challenges. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Shahnaz, C. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 490. Springer, Singapore. https://doi.org/10.1007/978-981-19-4052-1_1

Download citation

Publish with us

Policies and ethics