Abstract
The Internet of things has changed the technology to a new era, which enhanced our lifestyle. Because of the popularity of IoT in real world, the implementation of IoT in different areas created mislead of malicious access and security issue. Many researchers have studied, explored and opened the problems in security. The IoT is a concept which is an interconnection of our day-to-day devices. Devices are now elegantly communicating to human or each other. Each connected devices are attached to sensors and actuator senses and understands what is going on and performs the task accordingly. This paper discusses the different levels of IoT architecture and vulnerabilities in each level. The IoT devices are securely hackable and negotiable to use as per the requirement of malicious users. In this paper, we discuss the significant issues and challenges in the IoT environment and its communication, security, open problems, and their probable solutions. As the IoT devices are exposed to the vulnerabilities which need to be protected. To protect, we reviewed feasible solutions like use of blockchain, software define network (SDN), by using private and public keys and machine learning and deep learning algorithms to protect data in the cloud and IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things, In IEEE World Congress on Services (pp. 21–28).
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Giusto, D., Iera, A., Morabito, G., & Atzori, L. (Eds.). (2010). The internet of things: 20th Tyrrhenian workshop on digital communications. Springer Science & Business Media.
Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
Khan, A. A., Rehmani, M. H., & Rachedi, A. (2017). Cognitive-radio-based internet of things: Applications, architectures, spectrum-related functionalities, and future research directions. IEEE Wireless Communications, 24(3), 17–25.
Xu, W., Trappe, W., Zhang, Y. & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM
Noubir, G., & Lin, G. (2003). Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 29–30.
Chae, S. H., Choi, W., Lee, J. H., & Quek, T. Q. (2014). Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), 1617–1628.
Hong, Y. W. P., Lan, P. C., & Kuo, C. C. J. (2013). Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Processing Magazine, 30(5), 29–40.
Khari, M., Garg, A. K., Gandomi, A. H., Gupta, R., Patan, R., & Balusamy, B. (2019). Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Jha, S., Kumar, R., Chatterjee, J. M. & Khari, M (2019). Collaborative handshaking approaches between the internet of computing and internet of things towards a smart world: A review from 2009–2017. Telecommunication Systems, 70(4), 617–634.
Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2019). Machine learning in IoT Security: Current solutions and future challenges. arXiv preprint arXiv:1904.05735
Sha, K., Errabelly, R., Wei, W., Yang, T. A., & Wang, Z. (2017). Edges: Design of an edge layer security service to enhance IoT security. In 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC) (pp. 81–88).
Padhy, N., Panigrahi, R. & Neeraja, K. (2019). Threshold estimation from software metrics by using evolutionary techniques and its proposed algorithms, models. Evolutionary Intelligence. https://doi.org/10.1007/s12065-019-00201-0
Panigrahi, R., Padhy, N., Satapathy, S. C. (2019) Software reusability metrics estimation from the social media by using evolutionary algorithms: Refactoring perspective. International Journal of Open Source Software and Processes (IJOSSP), 10(2) , 21–36, IGI Global.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patnaik, R., Padhy, N., Srujan Raju, K. (2021). A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges. In: Satapathy, S., Bhateja, V., Janakiramaiah, B., Chen, YW. (eds) Intelligent System Design. Advances in Intelligent Systems and Computing, vol 1171. Springer, Singapore. https://doi.org/10.1007/978-981-15-5400-1_68
Download citation
DOI: https://doi.org/10.1007/978-981-15-5400-1_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5399-8
Online ISBN: 978-981-15-5400-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)