Internet of Things Security: A Survey

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1347))

Included in the following conference series:

  • 1808 Accesses

Abstract

Internet of Things (IoT) has attracted considerable attention, let alone acquaintance, in academia and industry in particular over the last few years. The factors behind this attraction are the new capabilities IoT is promising to deliver. On a human level, it creates an image of a future world in which everything in our ambient environment is hooked up to the internet and communicates seamlessly with each other in order to operate smartly. The ultimate aim is to allow objects around us to efficiently sense our environments, interact easily, and eventually create a better world for us: one where everyday objects behave on the basis of what we need and want without explicit orders. That being said, enabling devices to communicate to when they are not properly secured, the internet opens them up to a range of significant vulnerabilities. This research concentrates on security threats and vulnerabilities on each layer of IoT architecture. We survey a vast range of relevant IoT security works that use classical solutions and new emerging security solutions. The advantages of classical solutions are effective in optimizing resources such as memory, bandwidth and computing, but do not face the challenges of scalability and heterogeneity, While the emerging approaches like Software Based Networking and blockchain can offer to IoT through to their efficiency and scalability

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  2. Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)

    Article  Google Scholar 

  3. Kong, L., Khan, M.K., Wu, F., Chen, G., Zeng, P.: Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: overview, design, and challenges. IEEE Commun. Mag. 55(1), 62–68 (2017)

    Article  Google Scholar 

  4. Odelu, V., Das, A.K., Khan, M.K., Choo, K.K.R., Jo, M.: Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size Keys and ciphertexts. IEEE Access 5, 3273–3283 (2017)

    Article  Google Scholar 

  5. Tewari, A., Gupta, B.B.: A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. Int. J. Adv. Intell. Paradigms 9(2–3), 111–121 (2017)

    Article  Google Scholar 

  6. AbMalek, M.S.B., Ahmadon, M.A.B., Yamaguchi, S., Gupta, B.B.: On privacy verification in the IoT service based on PN 2. In: Proceedings of the Consumer Electronics, IEEE 5th Global Conference on 2016, pp. 1–4. IEEE (2016)

    Google Scholar 

  7. Yaqoob, I., Ahmed, E., Hashem, I.A.T., Ahmed, A.I.A., Gani, A., Imran, M., Guizani, M.: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 24, 10–16 (2017)

    Article  Google Scholar 

  8. **g, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20, 2481–2501 (2014)

    Article  Google Scholar 

  9. Ziegler, S.: Internet of Things Security and Data Protection. Springer International Publishing (2019)

    Google Scholar 

  10. Li, S., Li Da Xu.: Securing the internet of things, Syngress (2017)

    Google Scholar 

  11. Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener. Comput. Syst. 108, 909–920 (2020)

    Google Scholar 

  12. Mendez Mena, D., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Global Perspect. 27(3), 162–182 (2018)

    Article  Google Scholar 

  13. Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (siot)–when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594–3608 (2012)

    Article  Google Scholar 

  14. Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–5. IEEE‏ (2014)

    Google Scholar 

  15. Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260. IEEE‏ (2012)

    Google Scholar 

  16. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  17. Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)

    Google Scholar 

  18. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Network Comput. Appl. 88, 10–28 (2017)

    Article  Google Scholar 

  19. Yang, X., Li, Z., Geng, Z., Zhang, H.: A multi-layer security model for internet of things. In: Wang, Y., Zhang, X. (eds.) IOT 2012. CCIS, vol. 312, pp. 388–393. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32427-7_54

    Chapter  Google Scholar 

  20. Hunkeler, U., Truong, H.L., Stanford-Clark, A.: MQTT-S—a publish/subscribe protocol for Wireless Sensor Networks. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798. IEEE (2008)

    Google Scholar 

  21. **aohui, X.: Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pp. 407–410. IEEE (2013) ‏

    Google Scholar 

  22. Fan, Y., et al.: SNPL: one scheme of securing nodes in iot perception layer. Sensors 20(4), 1090 (2020)

    Google Scholar 

  23. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, vol. 3, pp. 648–651 (2012)

    Google Scholar 

  24. Rayes, A., Salam, S.: Internet of things from hype to reality. In: The Road to Digitization. River Publisher Series in Communications, vol. 49. Springer, Basel, Switzerland (2017) ‏

    Google Scholar 

  25. Jabraeil Jamali, M.A., Bahrami, B., Heidari, A., Allahverdizadeh, P., Norouzi, F.: Towards the Internet of Things. EICC. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-18468-1

    Book  Google Scholar 

  26. Husamuddin, M.; Qayyum, M.: Internet of Things: a study on security and privacy threats. In: Proceedings of the 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia, pp. 26–27 (2017)

    Google Scholar 

  27. Noura, H.: Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations: Design, Analyze and Lessons Learned. HDR dissertation, University of Pierre Marie Curie-Paris VI.‏ (2016)

    Google Scholar 

  28. Yang, X., Lin, J., Yu, W., Moulema, P.M., Fu, X., Zhao, W.: A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Trans. Comput. 64(1), 4–18 (2013)

    Article  MathSciNet  Google Scholar 

  29. Hassan, W.H.: Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 148, 283–294 (2019)

    Article  Google Scholar 

  30. ‏Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks (2017) ‏

    Google Scholar 

  31. Maheswari, S.U., Usha, N.S., Anita, E.M., Devi, K.R.: A novel robust routing protocol RAEED to avoid DoS attacks in WSN. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1–5. IEEE (2016)

    Google Scholar 

  32. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  33. Ragab, A., Selim, G., Wahdan, A., Madani, A.: Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 5–19. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_1

    Chapter  Google Scholar 

  34. Abomhara, M., Koien, G.M.: Security and privacy in the Internet of Things: current status and open issues. In: International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8 (2014)

    Google Scholar 

  35. Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3, pp. 1062–1066 (2012)

    Google Scholar 

  36. Wen, Q., Dong, X., Zhang, R.: Application of dynamic variable cipher security certificate in Internet of Things. In: Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China (2012)

    Google Scholar 

  37. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 49–63 (2005)

    Google Scholar 

  38. Bharathi, M.V., Tanguturi, R.C., Jayakumar, C.; Selvamani, K.: Node capture attack in wireless sensor network: a survey. In: Proceedings of the 2012 IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), Coimbatore, India, pp. 1–3. and Security (CIS) (2013)

    Google Scholar 

  39. Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient distributed detection of node replication attacks in sensor networks. In: Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, USA (2007)

    Google Scholar 

  40. Weixiong, Y., Robin, L., Kon Soon Seng, A.: Security and privacy concerns in wireless networks-a survey (2020)‏

    Google Scholar 

  41. Gomez, G., Lopez-Martinez, F.J., Morales-Jimenez, D., McKay, M.R.: On the equivalence between interference and eavesdrop** in wireless communications. IEEE Trans. Veh. Technol. 64(12), 5935–5994 (2015)

    Article  Google Scholar 

  42. Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput. 3, 64–71 (2016)

    Article  Google Scholar 

  43. Na, S., Hwang, D., Shin, W., Kim, K.H.: Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In: Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam, pp. 11–13 (2017)

    Google Scholar 

  44. Burhan, M., Rehman, R.A., Khan, B., Kim, B.S.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)

    Article  Google Scholar 

  45. Shahverdi, A., Taha, M., Eisenbarth, T.: Lightweight side channel resistance: threshold implementations of S imon. IEEE Trans. Comput. 66, 661–671 (2017)

    Article  MathSciNet  Google Scholar 

  46. Choi, J., Kim, Y.: An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system. In: Proceedings of the 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, Korea (2016)

    Google Scholar 

  47. Tawalbeh, L.A., Somani, T.F.: More secure Internet of Things using robust encryption algorithms against side channel attacks. In: Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco (2016)

    Google Scholar 

  48. Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701–771 (2005)

    Article  Google Scholar 

  49. Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5), 491–505 (2010)

    Article  Google Scholar 

  50. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017)

    Article  Google Scholar 

  51. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)

    Article  Google Scholar 

  52. Kumar, S.A., Vealey, T., Srivastava, H.: Security in internet of things: Challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5772–5781. IEEE (2016)

    Google Scholar 

  53. Qureshi, K.N., et al.: A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain. Cities Soc. 61, 102343 (2020)

    Google Scholar 

  54. Kalnoor, G., Agarkhed, J.: Qos based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In: Proceedings of 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), March 2016

    Google Scholar 

  55. Anirudh, M., Thileeban, S.A., Nallathambi, D.J.: Use of honeypots for mitigating DOS attacks targeted on IoT networks. In: Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India (2017)

    Google Scholar 

  56. Choi, M.K., Robles, R.J., Hong, C.H., Kim, T.H.: Wireless network security: vulnerabilities, threats and countermeasures. Int. J. Multimed. Ubiquit. Eng. 3(3), 77–86 (2008)

    Google Scholar 

  57. Pacheco, L.A.B., Gondim, J.J.C., Barreto, P.A.S., Alchieri, E.: Evaluation of distributed denial of service threat in the internet of things. In: Proceedings of the 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA (2016)

    Google Scholar 

  58. Machaka, P., Bagula, A., Nelwamondo, F.: Using exponentially weighted moving average algorithm to defend against DDoS attacks. In: Proceedings of the 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), Stellenbosch, South Africa (2016)

    Google Scholar 

  59. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187. IEEE (2015) ‏

    Google Scholar 

  60. Bok, B.G.J.: Innovating the retail industry: an IoT approach (Bachelor’s thesis, University of Twente) (2016)

    Google Scholar 

  61. Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 141, 199–221 (2018)

    Article  Google Scholar 

  62. Al-Turjman, F., Alturjman, S.: Confidential smart-sensing framework in the IoT era. J upercomput 74, 5187–5198 (2018)

    Article  Google Scholar 

  63. Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, RProposed embedded security framework for internet of things (IoT). In: 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5 (2011)

    Google Scholar 

  64. Chandra, S., et al.: A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE). IEEE (2014)‏

    Google Scholar 

  65. Seyyedi, S.A., Sadau, V., Ivanov, N.: A secure steganography method based on integer lifting wavelet transform. IJ Netw. Secur. 18(1), 124–132 (2016)

    Google Scholar 

  66. Biryukov, Alex., Dinu, Daniel, Le Corre, Yann: Side-channel attacks meet secure network protocols. In: Gollmann, Dieter, Miyaji, Atsuko, Kikuchi, Hiroaki (eds.) ACNS 2017. LNCS, vol. 10355, pp. 435–454. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61204-1_22

    Chapter  Google Scholar 

  67. He, D., Bu, J., Zhu, S., Chan, S., Chen, C.: Distributed access control with privacy support in wireless sensor networks. IEEE Trans. Wireless Commun. 10(10), 3472–3481 (2011)

    Article  Google Scholar 

  68. Thirumalai, C., Mohan, S., Srivastava, G.: An efficient public key secure scheme for cloud and IoT security. Comput. Commun. 150, 634–643 (2020)

    Article  Google Scholar 

  69. ‏Chhabra, A., Arora, S.: An elliptic curve cryptography based encryption scheme for securing the cloud against eavesdrop** attacks. In: 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 243–246. IEEE (2017).

    Google Scholar 

  70. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  71. Kumar, P.V., Aluvalu, R.: Key-Policy Attribute Based Encryption (KP-ABE). In: International Journal of Innovative and Emerging Research in Engineering 2.2 (2015).‏

    Google Scholar 

  72. Sara, A., Yassine, T., Abdellatif, M.: Secure confidential big data sharing in cloud computing using KP-ABE. In: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, pp. 1–4 (2017)

    Google Scholar 

  73. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007).‏

    Google Scholar 

  74. Chen, W.: An IBE-based security scheme on internet of things. In: 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3, pp. 1046–1049. IEEE‏ (2012)

    Google Scholar 

  75. Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382–388. IEEE (2016)‏

    Google Scholar 

  76. Chatzigiannakis, I., Pyrgelis, A., Spirakis, P.G., Stamatiou, Y.C.: Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In: 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 715–720. IEEE (2011)

    Google Scholar 

  77. Jadhav, S.P., Balabanov, G., Poulkov, V., Shaikh, J.R.: Enhancing the security and efficiency of resource constraint devices in IoT. In: 2020 International Conference on Industry 4.0 Technology (I4Tech), pp. 163–166. IEEE (2020) ‏

    Google Scholar 

  78. Bruening, P.J., Waterman, K.K.: Data tagging for new information governance models. IEEE Secur. Priv. 8(5), 64–68 (2010)

    Article  Google Scholar 

  79. Evans, D., Eyers, D.M.: Efficient data tagging for managing privacy in the internet of things. In: 2012 IEEE International Conference on Green Computing and Communications, pp. 244–248. IEEE (2012)‏

    Google Scholar 

  80. Ahn, S., Oh, H., Kim, H.J., Choi, J.K.: Data lifecycle and tagging for Internet of Things applications. In: Kang, B.H., Bai, Q. (eds.) AI 2016. LNCS (LNAI), vol. 9992, pp. 691–695. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-50127-7_61

    Chapter  Google Scholar 

  81. Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754–762. IEEE (2014 ‏

    Google Scholar 

  82. Li, H.T., Ma, J.F., Fu, S.: A privacy-preserving data collection model for digital community. Sci. China Inf. Sci. 58(3), 1–16 (2014)

    Google Scholar 

  83. Huo-wang, W., Cheng, Z.H.O.N.G.: Parallel clustering-based k-anonymity algorithm in internet of things. Inf. Technol. 12, 003 (2013)

    Google Scholar 

  84. Tonyali, S., Cakmak, O., Akkaya, K., Mahmoud, M.M., Guvenc, I.: Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid AMI networks. IEEE Internet Things J. 3(5), 709–719 (2015)

    Article  Google Scholar 

  85. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  86. Maleh, Y., Ezzati, A., Belaissaoui, M.: Dos attacks analysis and improvement in dtls protocol for internet of things. In: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, pp. 1–7 (2016) ‏

    Google Scholar 

  87. Kasinathan, P., Pastrone, C., Spirito, M.A., Vinkovits, M.: Denial-of-service detection in 6lowpan based internet of things. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 600–607 (2013)

    Google Scholar 

  88. Rathore, S., Pan, Y., Park, J.H.: BlockDeepNet: a Blockchain-based secure deep learning for IoT network. Sustainability 11(14), 3974 (2019)

    Article  Google Scholar 

  89. Atlam, H.F., Walters, R.J., Wills, G.B.: Intelligence of things: opportunities & challenges. In: 2018 3rd Cloudification of the Internet of Things (CIoT), pp. 1–6. IEEE (2018) ‏

    Google Scholar 

  90. Hodo, E., Bellekens, X., Hamilton, A.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia, pp. 1–6 (2016)

    Google Scholar 

  91. Liu, L., Xu, B., Zhang, X., Wu, X.: An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J. Wirel. Commun. Networking 2018, 113 (2018)

    Google Scholar 

  92. Amores, J., Maes, P., Paradiso, J.: Binary: detecting the state of organic trash to prevent insalubrity. In: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, pp. 313–316 (2015) ‏

    Google Scholar 

  93. Han, M.L., Lee, J., Kang, A.R., Kang, S., Park, J.K., Kim, H.K.: A statistical-based anomaly detection method for connected cars in internet of things environment. In: Hsu, C.-H., **a, F., Liu, X., Wang, S. (eds.) IOV 2015. LNCS, vol. 9502, pp. 89–97. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27293-1_9

    Chapter  Google Scholar 

  94. Islam, M.J., Mahin, M., Roy, S., Debnath, B.C., Khatun, A.: Distblacknet: a distributed secure black sdn-iot architecture with nfv implementation for smart cities. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–6. IEEE (2019) ‏

    Google Scholar 

  95. Iqbal, W., et al.: An in-depth analysis of IoT security requirements, challenges and their countermeasures via software defined security. IEEE Internet Things J. PP(99) 1 (2020)‏

    Google Scholar 

  96. Krishnan, Prabhakar., Najeem, Jisha S., Achuthan, Krishnashree: SDN framework for securing IoT networks. In: Kumar, Navin, Thakre, Arpita (eds.) UBICNET 2017. LNICST, vol. 218, pp. 116–129. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73423-1_11

    Chapter  Google Scholar 

  97. Sood, K., Yu, S., **ang, Y.: Software-defined wireless networking opportunities and challenges for Internet-of-Things: a review. IEEE Internet Things J. 3(4), 453–463 (2015)

    Article  Google Scholar 

  98. Bull, P., Austin, R., Sharma, M.: Pre-emptive flow installation for internet of things devices within software defined networks. In: 2015 3rd International Conference on Future Internet of Things and Cloud, pp. 124–130. IEEE (2015)

    Google Scholar 

  99. Singh, Pranav Kumar., Singh, Roshan., Nandi, Sunit Kumar, Nandi, Sukumar: Designing a blockchain based framework for IoT data trade. In: Rautaray, Siddharth Swarup, Eichler, Gerald, Erfurth, Christian, Fahrnberger, Günter (eds.) I4CS 2020. CCIS, vol. 1139, pp. 295–308. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-37484-6_17

    Chapter  Google Scholar 

  100. Atlam, H.F., et al.: Blockchain with internet of things: Benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10(6), 40–48 (2018).

    Google Scholar 

  101. Kshetri, N.: Can blockchain strengthen the Internet of Things? IT Prof. 19(4), 68–72 (2017)

    Article  Google Scholar 

  102. Dorri, A., Kanhere, S.S., Jurdak, R.: Blockchain in internet of things: challenges and solutions. ar**v preprint ar**v:1608.05187 (2016) ‏

  103. Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 88, 173–190 (2018) ‏

    Google Scholar 

  104. Zheng, Z., **e, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. IEEE Int. Congress Big Data 2017, 557–564 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shatha A. Baker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baker, S.A., Nori, A.S. (2021). Internet of Things Security: A Survey. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6835-4_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6834-7

  • Online ISBN: 978-981-33-6835-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation