Cargando…
Internet of Things: Security and Solutions Survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human l...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9571254/ https://www.ncbi.nlm.nih.gov/pubmed/36236531 http://dx.doi.org/10.3390/s22197433 |
_version_ | 1784810318951612416 |
---|---|
author | Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed |
author_facet | Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed |
author_sort | Sadhu, Pintu Kumar |
collection | PubMed |
description | The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work. |
format | Online Article Text |
id | pubmed-9571254 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95712542022-10-17 Internet of Things: Security and Solutions Survey Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Sensors (Basel) Review The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work. MDPI 2022-09-30 /pmc/articles/PMC9571254/ /pubmed/36236531 http://dx.doi.org/10.3390/s22197433 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Internet of Things: Security and Solutions Survey |
title | Internet of Things: Security and Solutions Survey |
title_full | Internet of Things: Security and Solutions Survey |
title_fullStr | Internet of Things: Security and Solutions Survey |
title_full_unstemmed | Internet of Things: Security and Solutions Survey |
title_short | Internet of Things: Security and Solutions Survey |
title_sort | internet of things: security and solutions survey |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9571254/ https://www.ncbi.nlm.nih.gov/pubmed/36236531 http://dx.doi.org/10.3390/s22197433 |
work_keys_str_mv | AT sadhupintukumar internetofthingssecurityandsolutionssurvey AT yanambakavenkatap internetofthingssecurityandsolutionssurvey AT abdelgawadahmed internetofthingssecurityandsolutionssurvey |