Skip to main content

A Comprehensive Survey on Internet of Things Security: Challenges and Solutions

  • Conference paper
  • First Online:
Mobile Computing and Sustainable Informatics

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 166))

Abstract

Internet of Things (IoT) is a group of self-contained objects, which is a brand-new pattern that incorporates the current existence of various devices. It is one of the most recent technologies that offer worldwide connectivity, user, sensor, and information management. Devices can become ubiquitously connected, thanks to connectivity. IoT has a number of problems, including fading, energy use, data security, network security, etc. Security emerges as one of the biggest issues among these. In this paper, a survey on IoT security solutions is presented to illustrate the various IoT security procedures. The security protocols that are divided into four categories based on technologies used to provide security such as machine learning, trust, blockchain, and cryptography have been elaborated. The major purpose of these protocols is to address the issue of network routing assaults in IoT. Each protocol’s benefits and drawbacks are examined together with the performance indicators that were used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. J Big Data. https://doi.org/10.1186/s40537-019-0268-2

  2. Nagesh UB, Nayana MS, Shruthi CS, Poojary S, Vaishnavi PS, Mayengbam V (2021) A review paper of security in internet of things (internet of things). Int J Adv Res Sci Commun Technol (IJARSCT) 11(1)

    Google Scholar 

  3. Dar Z, Ahmed A, Khan FA et al (2020) A context-aware encryption protocol suite for edge computing-based Internet of Things devices. J Supercomput 76:2548–2567. https://doi.org/10.1007/s1127-019-03021-2

  4. Iqbal MA, Olaleye OG, Bayoumi MA (2016) A review on internet of things (internet of things): security and privacy requirements and the solution approaches. Glob J Comput Sci Technol E Netw Web Secur 16(7)

    Google Scholar 

  5. Abiodun OI, Abiodun EO, Alawida M, Alkhawaldeh RS, Arshad H (2021) A review on the security of the internet of things: challenges and solutions. Wireless Personal Commun

    Google Scholar 

  6. Burhan M, Rehman RA, Khan B (2018) Internet of things elements, layered architectures and security issues: a comprehensive survey. Sensors

    Google Scholar 

  7. Patel VH, Patel S (2021) A review on internet of things security: challenges and solution using lightweight cryptography and security service mechanisms offloading at fog. ICICNIS 2020

    Google Scholar 

  8. Moni Sree H, Pavithra R, Nithyaa Shri RB, Shanthi M (2021) Review on internet of things security and its real-time application. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA)

    Google Scholar 

  9. Aqeel M, Ali F, Iqbal MW, Rana TA, Arif M, Rabiul Auwul M (2022) A review of security and privacy concerns in the internet of things (internet of things). Hindawi, J Sens 20

    Google Scholar 

  10. Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in internet of things. Procedia Comput Sci 132:1815–1823

    Google Scholar 

  11. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for internet of things security and privacy: the case study of a smart home. In: 2nd IEEE PERCOM workshop on security privacy and trust in the internet of things

    Google Scholar 

  12. Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for internet of things. Internet of things. Pittsburgh, PA USA

    Google Scholar 

  13. Ngubo C, Dohler M, Mcburney P (2019) Blockchain, internet of things and sidechains. In: Proceedings of the international multiconference of engineers and computer scientists 2019 IMECS 2019, March 13–15, 2019, Hong Kong

    Google Scholar 

  14. Minoli D, Occhiogrosso B (2018) Blockchain mechanisms for internet of things security. Internet of Things 1–2:1–13

    Article  Google Scholar 

  15. Chao Q, Tao M, Yuan R (2018) A hypergraph-based blockchain model and application in internet of things-enabled smart homes. Sensors 18:2784. https://doi.org/10.3390/s18092784

    Article  Google Scholar 

  16. Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for internet of things. Sensors 19:326. https://doi.org/10.3390/s19020326

  17. Garg R et al (2021) Secure internet of things via blockchain. In: IOP conference Ser. Mater. Sci. Eng. 1022, p 012048

    Google Scholar 

  18. Picone M, Cirani S, Veltri L (2021) Blockchain security and privacy for the internet of things. Sensors 21:892. https://doi.org/10.3390/s21030892

    Article  Google Scholar 

  19. Hasan M, Islam MM, Zarif MII, Hashem MMA (2019) Attack and anomaly detection in internet of things sensors in internet of things sites using machine learning approaches. Internet of things 7:100059

    Google Scholar 

  20. Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in internet of things networks. IEEE

    Google Scholar 

  21. Mahmud M, Kaiser MS, Rahman MM, Rahman MA, Shabut A, Al-Mamun S, Hussain A (2018) A brain-inspired trust management model to assure security in a cloud based internet of things framework for neuroscience applications. Cogn Comput. https://doi.org/10.1007/s12559-018-9543-3.

  22. Canedo J, Skjellum J (2016) Using machine learning to secure internet of things systems. In: IEEE 14th annual conference on privacy, security and trust (PST)

    Google Scholar 

  23. Chatterjee B, Das D, Maity S, Sen S (2018) RF-PUF: enhancing internet of things security through authentication of wireless nodes using in-situ machine learning. IEEE

    Google Scholar 

  24. Chinnaswamy S, Annapurani K (2021) Trust aggregation authentication protocol using machine learning for internet of things wireless sensor networks. Comput Electr Eng 91:107130

    Google Scholar 

  25. Jayasinghe U, Lee GY, Um TW, Shi Q (2018) Machine learning based trust computational model for internet of things services. IEEE Trans Sustain Comput

    Google Scholar 

  26. Thamilarasu G, Chawla S (1977) Towards deep-learning-driven intrusion detection for the internet of things. Sensors 2019:19. https://doi.org/10.3390/s19091977

    Article  Google Scholar 

  27. Alghofaili Y, Rassam MA (2022) A trust management model for internet of things devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique. Sensors 22:634

    Google Scholar 

  28. Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic internet of things. IET Commun 13(20):3463–3471

    Google Scholar 

  29. Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Hindawi Secur Commun Netw 10

    Google Scholar 

  30. Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-internet of things: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C

    Article  Google Scholar 

  31. Zhu C, Joel JP, Rodrigues C, Victor C, Leung M, Shu L, Yang LT (2018) Trust-based communication for the industrial internet of things. Adv Indus Wireless Sens Netw Intell Internet Things

    Google Scholar 

  32. Abdalzaher MS, Samy L, Muta O (2019) Non-zero-sum game-based trust model to enhance wireless sensor networks security for internet of things applications. 9(4):218–226

    Google Scholar 

  33. Chen IR, Guo J (2019) Trust-based service management for mobile cloud internet of things systems. IEEE Trans Netw Serv Manage 16(1)

    Google Scholar 

  34. Khan ZA, Ullrich J, Voyiatzis AG (2017) A trust-based resilient routing mechanism for the internet of things. ARES ’17, Aug 29–Sept 01, 2017, Reggio Calabria, Italy

    Google Scholar 

  35. Chen J, Tian Z, Cui X, Yin L, Wang X (2019) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput 10:3099–3107

    Article  Google Scholar 

  36. Arseni S-C, Chifor B-C, Coca M, Medvei M, Bica I, Matei I (1840) RESFIT: a reputation and security monitoring platform for internet of things applications. Electronics 2021:10

    Google Scholar 

  37. Sciancalepore S (2022) PARFAIT: privacy-preserving, secure, and low-delay service access in fog-enabled internet of things ecosystems. Comput Netw 206:108799

    Article  Google Scholar 

  38. Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for internet of things-based healthcare using smart gateways. Procedia Comput Sci 52:452–459

    Google Scholar 

  39. Xie Q, Ding Z, Hu B (2021) A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in internet of things. Secur Commun Netw 2021:12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilima Karankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Karankar, N., Seth, A. (2023). A Comprehensive Survey on Internet of Things Security: Challenges and Solutions. In: Shakya, S., Papakostas, G., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 166. Springer, Singapore. https://doi.org/10.1007/978-981-99-0835-6_51

Download citation

Publish with us

Policies and ethics