Cargando…

Internet of Things: Security and Solutions Survey

The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human l...

Descripción completa

Detalles Bibliográficos
Autores principales: Sadhu, Pintu Kumar, Yanambaka, Venkata P., Abdelgawad, Ahmed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9571254/
https://www.ncbi.nlm.nih.gov/pubmed/36236531
http://dx.doi.org/10.3390/s22197433
_version_ 1784810318951612416
author Sadhu, Pintu Kumar
Yanambaka, Venkata P.
Abdelgawad, Ahmed
author_facet Sadhu, Pintu Kumar
Yanambaka, Venkata P.
Abdelgawad, Ahmed
author_sort Sadhu, Pintu Kumar
collection PubMed
description The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
format Online
Article
Text
id pubmed-9571254
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-95712542022-10-17 Internet of Things: Security and Solutions Survey Sadhu, Pintu Kumar Yanambaka, Venkata P. Abdelgawad, Ahmed Sensors (Basel) Review The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work. MDPI 2022-09-30 /pmc/articles/PMC9571254/ /pubmed/36236531 http://dx.doi.org/10.3390/s22197433 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Sadhu, Pintu Kumar
Yanambaka, Venkata P.
Abdelgawad, Ahmed
Internet of Things: Security and Solutions Survey
title Internet of Things: Security and Solutions Survey
title_full Internet of Things: Security and Solutions Survey
title_fullStr Internet of Things: Security and Solutions Survey
title_full_unstemmed Internet of Things: Security and Solutions Survey
title_short Internet of Things: Security and Solutions Survey
title_sort internet of things: security and solutions survey
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9571254/
https://www.ncbi.nlm.nih.gov/pubmed/36236531
http://dx.doi.org/10.3390/s22197433
work_keys_str_mv AT sadhupintukumar internetofthingssecurityandsolutionssurvey
AT yanambakavenkatap internetofthingssecurityandsolutionssurvey
AT abdelgawadahmed internetofthingssecurityandsolutionssurvey