RESEARCH REGARDING THE SAFE USE OF INTERCONNECTED SMART DEVICES ON THE INTERNET OF THINGS

Valentin MANIU, Cosmin PIELE

Abstract


The Internet of Things (IoT) constitutes a globally interconnected network of computing, sensing, and networking devices that facilitate data exchange through diverse communication protocols. Recent advancements in technologies have significantly enhanced the seamless integration of smart devices. Consequently, the selection of an optimal network security design is imperative for system architects, necessitating a thorough evaluation of networks not only in terms of connectivity but also from a security standpoint. This article depicts a detailed analysis of IoT architecture, device security, and associated challenges in maintaining security requirements for IoT devices. It explores various cyber threats, their attack mechanisms, and potential mitigation strategies. Furthermore, the study outlines future directions to adopt the security challenges of next-generation IoT systems. The empirical data of this study is to offer a clear summary of IoT security, cyberattacks, and prospective solutions, offering valuable insights for both academics and industry professionals across diverse contexts.

Full Text:

PDF

References


Maglaras, L.A., Ferrag, M. A., Janicke, H., Ayres, N., Tassiulas, L., Reliability, security, and privacy in power grids, Computer, 55 (2022b), 85–88.

Reed D., Applying the OSI seven-layer network model to information security, SANS GIAC GSEC Practical Assignment Version 1.4 b Option One, 2003.

Kaur D., Singh, P., Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack, International Journal on Network Security, vol. 5(1), 2014, pp. 62.

Mitrokotsa, A., Rieback, M. R., Tanenbaum, A. S., Classification of RFID attacks, Gen,15693, Volume 12, Issue 5, pp. 491–505, 2010.

Li, H., Chen, Y., He, Z., The survey of RFID attacks and defenses, 8th International Conference on Wireless Communications, Shanghai: Networking and Mobile Computing (WiCOM), 2012.

Deogirikar, J., Vidhate, A., Security attacks in IoT: A survey, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 32–37, doi: 10.1109/I-SMAC.2017.8058363, 2017.

Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A., Security, privacy and trust in Internet of Things: The road ahead, Computer Network, vol. 76, pp. 146–164, Jan. 2015.

Arabo, A., Brown, I., El-Moussa, F., Privacy in the age of mobility and smart devices in smart homes, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on Social Computing (Social Com). IEEE, 2012, pp. 819–826.

Sarowar, M. G., Kamal, M. S., Dey, N. 2019, Internet of Things and Its Impacts in Computing Intelligence: A Comprehensive Review – IoT Application for Big Data, N. Dey and S. Tamane (Eds.), Big Data Analytics for Smart and Connected Cities (pp. 103–136). Hershey, PA: IGI Global. doi: 10.4018/978-1-5225-6207-8.ch005.

Hassanien, A. E., Dey, N., Borra, S. (Eds.), 2018, Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications, CRC Press, Boca Raton. eBook ISBN 9781351030380, 2018.

Jelić, A., What is architecture for? Designing as enriching the landscape of affordances, Adapt. Behav., vol. 30, no. 6, pp. 585–587, 2022. doi: 10.1177/1059712321994686.

Lu, Y., Cecil, J., An Internet of Things (IoT)-based collaborative framework for advanced manufacturing, Int. J. Adv. Manuf. Technol., vol. 84, no. 2, pp. 1141–1152, 2016. doi: 10.1007/s00170-015-7772-0.

Jabraeil, J. M. A., et al., IoT architecture, in Towards the Internet of Things, 1st ed. Cham, Switzerland: Springer, 2020, pp. 9–31.

Ahmid M., Kazar, O., A comprehensive review of the internet of things security, J. Appl. Secur. Res., vol. 18, no. 3, pp. 289–305, 2023. doi: 10.1080/19361610.2021.1962677.

Alqarawi, G., Alkhalifah, B., Alharbi, N., El Khediri, S., Internet-of-Things security and vulnerabilities: Case study, J. Appl. Secur. Res., vol. 18, no. 3, pp. 559–575, 2023. doi: 10.1080/19361610.2022.2031841.

Hassan, A., et al., Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity, Computers, Materials & Continua, 2024, 81(3), 3499–3559.

Alam, T., Design a blockchain-based middleware layer in the Internet of Things architecture, Int. J. Informat. Vis., vol. 4, no. 1, pp. 28–31, 2020. doi: 10.30630/joiv.4.1.334.

Gerodimos, A., et al, IoT: Communication protocols and security threats, Internet of Things and Cyber-Physical Systems Volume 3, 2023, Pages 1–13.

Fan, Y., et al., SNPL: One scheme of securing nodes in IoT perception layer, Sensors, vol. 20, no. 4, 2020, Art. no. 1090. doi: 10.3390/s20041090.

Rodrigues C. K. D. S., Rocha, V., Towards blockchain for suitable efficiency and data integrity of IoT ecosystem transactions, IEEE Lat. Am. Trans., vol. 19, no. 7, pp. 1199–1206, 2021. doi: 10.1109/TLA.2021.9461849.

Devi M., Majumder, A., Side-channel attack in Internet of Things: A survey, Appl. Internet Things: Proc. ICCCIOT 2020, Singapore, Springer, 2021, pp. 213–222. doi: 10.1007/978-981-15-6198-6_20.

Nasralla, M. M., García-Magariño, I., Lloret, J., Defenses against perception-layer attacks on IoT smart furniture for impaired people, IEEE Access, vol. 8, pp. 119795119805, 2020. doi: 10.1109/ACCESS.2020.3004814.

Nebbione, G., Calzarossa, M. C., Security of IoT application layer protocols: Challenges and findings, Futur Internet, vol. 12, no. 3, 2020, Art. no. 55. doi: 10.3390/fi12030055.


Refbacks

  • There are currently no refbacks.


JOURNAL INDEXED IN :