Abstract
Internet of Things (IoT) is a group of self-contained objects, which is a brand-new pattern that incorporates the current existence of various devices. It is one of the most recent technologies that offer worldwide connectivity, user, sensor, and information management. Devices can become ubiquitously connected, thanks to connectivity. IoT has a number of problems, including fading, energy use, data security, network security, etc. Security emerges as one of the biggest issues among these. In this paper, a survey on IoT security solutions is presented to illustrate the various IoT security procedures. The security protocols that are divided into four categories based on technologies used to provide security such as machine learning, trust, blockchain, and cryptography have been elaborated. The major purpose of these protocols is to address the issue of network routing assaults in IoT. Each protocol’s benefits and drawbacks are examined together with the performance indicators that were used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kumar S, Tiwari P, Zymbler M (2019) Internet of things is a revolutionary approach for future technology enhancement: a review. J Big Data. https://doi.org/10.1186/s40537-019-0268-2
Nagesh UB, Nayana MS, Shruthi CS, Poojary S, Vaishnavi PS, Mayengbam V (2021) A review paper of security in internet of things (internet of things). Int J Adv Res Sci Commun Technol (IJARSCT) 11(1)
Dar Z, Ahmed A, Khan FA et al (2020) A context-aware encryption protocol suite for edge computing-based Internet of Things devices. J Supercomput 76:2548–2567. https://doi.org/10.1007/s1127-019-03021-2
Iqbal MA, Olaleye OG, Bayoumi MA (2016) A review on internet of things (internet of things): security and privacy requirements and the solution approaches. Glob J Comput Sci Technol E Netw Web Secur 16(7)
Abiodun OI, Abiodun EO, Alawida M, Alkhawaldeh RS, Arshad H (2021) A review on the security of the internet of things: challenges and solutions. Wireless Personal Commun
Burhan M, Rehman RA, Khan B (2018) Internet of things elements, layered architectures and security issues: a comprehensive survey. Sensors
Patel VH, Patel S (2021) A review on internet of things security: challenges and solution using lightweight cryptography and security service mechanisms offloading at fog. ICICNIS 2020
Moni Sree H, Pavithra R, Nithyaa Shri RB, Shanthi M (2021) Review on internet of things security and its real-time application. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA)
Aqeel M, Ali F, Iqbal MW, Rana TA, Arif M, Rabiul Auwul M (2022) A review of security and privacy concerns in the internet of things (internet of things). Hindawi, J Sens 20
Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in internet of things. Procedia Comput Sci 132:1815–1823
Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for internet of things security and privacy: the case study of a smart home. In: 2nd IEEE PERCOM workshop on security privacy and trust in the internet of things
Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for internet of things. Internet of things. Pittsburgh, PA USA
Ngubo C, Dohler M, Mcburney P (2019) Blockchain, internet of things and sidechains. In: Proceedings of the international multiconference of engineers and computer scientists 2019 IMECS 2019, March 13–15, 2019, Hong Kong
Minoli D, Occhiogrosso B (2018) Blockchain mechanisms for internet of things security. Internet of Things 1–2:1–13
Chao Q, Tao M, Yuan R (2018) A hypergraph-based blockchain model and application in internet of things-enabled smart homes. Sensors 18:2784. https://doi.org/10.3390/s18092784
Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for internet of things. Sensors 19:326. https://doi.org/10.3390/s19020326
Garg R et al (2021) Secure internet of things via blockchain. In: IOP conference Ser. Mater. Sci. Eng. 1022, p 012048
Picone M, Cirani S, Veltri L (2021) Blockchain security and privacy for the internet of things. Sensors 21:892. https://doi.org/10.3390/s21030892
Hasan M, Islam MM, Zarif MII, Hashem MMA (2019) Attack and anomaly detection in internet of things sensors in internet of things sites using machine learning approaches. Internet of things 7:100059
Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in internet of things networks. IEEE
Mahmud M, Kaiser MS, Rahman MM, Rahman MA, Shabut A, Al-Mamun S, Hussain A (2018) A brain-inspired trust management model to assure security in a cloud based internet of things framework for neuroscience applications. Cogn Comput. https://doi.org/10.1007/s12559-018-9543-3.
Canedo J, Skjellum J (2016) Using machine learning to secure internet of things systems. In: IEEE 14th annual conference on privacy, security and trust (PST)
Chatterjee B, Das D, Maity S, Sen S (2018) RF-PUF: enhancing internet of things security through authentication of wireless nodes using in-situ machine learning. IEEE
Chinnaswamy S, Annapurani K (2021) Trust aggregation authentication protocol using machine learning for internet of things wireless sensor networks. Comput Electr Eng 91:107130
Jayasinghe U, Lee GY, Um TW, Shi Q (2018) Machine learning based trust computational model for internet of things services. IEEE Trans Sustain Comput
Thamilarasu G, Chawla S (1977) Towards deep-learning-driven intrusion detection for the internet of things. Sensors 2019:19. https://doi.org/10.3390/s19091977
Alghofaili Y, Rassam MA (2022) A trust management model for internet of things devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique. Sensors 22:634
Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic internet of things. IET Commun 13(20):3463–3471
Caminha J, Perkusich A, Perkusich M (2018) A smart trust management method to detect on-off attacks in the internet of things. Hindawi Secur Commun Netw 10
Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-internet of things: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207–1228. https://doi.org/10.2298/CSIS110303056C
Zhu C, Joel JP, Rodrigues C, Victor C, Leung M, Shu L, Yang LT (2018) Trust-based communication for the industrial internet of things. Adv Indus Wireless Sens Netw Intell Internet Things
Abdalzaher MS, Samy L, Muta O (2019) Non-zero-sum game-based trust model to enhance wireless sensor networks security for internet of things applications. 9(4):218–226
Chen IR, Guo J (2019) Trust-based service management for mobile cloud internet of things systems. IEEE Trans Netw Serv Manage 16(1)
Khan ZA, Ullrich J, Voyiatzis AG (2017) A trust-based resilient routing mechanism for the internet of things. ARES ’17, Aug 29–Sept 01, 2017, Reggio Calabria, Italy
Chen J, Tian Z, Cui X, Yin L, Wang X (2019) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput 10:3099–3107
Arseni S-C, Chifor B-C, Coca M, Medvei M, Bica I, Matei I (1840) RESFIT: a reputation and security monitoring platform for internet of things applications. Electronics 2021:10
Sciancalepore S (2022) PARFAIT: privacy-preserving, secure, and low-delay service access in fog-enabled internet of things ecosystems. Comput Netw 206:108799
Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for internet of things-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
Xie Q, Ding Z, Hu B (2021) A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in internet of things. Secur Commun Netw 2021:12
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Karankar, N., Seth, A. (2023). A Comprehensive Survey on Internet of Things Security: Challenges and Solutions. In: Shakya, S., Papakostas, G., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 166. Springer, Singapore. https://doi.org/10.1007/978-981-99-0835-6_51
Download citation
DOI: https://doi.org/10.1007/978-981-99-0835-6_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0834-9
Online ISBN: 978-981-99-0835-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)