A Comprehensive Approach to Protocols and Security in Internet of Things Technology
DOI:
https://doi.org/10.62411/jcta.11660Keywords:
Communication Protocols, Cybersecurity in IoT, Internet of Things (IoT) Security, Network Vulnerabilities, Secure Data TransmissionAbstract
The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. This article comprehensively analyzes the primary vulnerabilities and risks associated with IoT, exploring innovative strategies and effective solutions to strengthen its security framework. The article highlights the critical role of secure device authentication, data encryption, regular updates, and continuous monitoring by addressing the intricacies of communication protocols and emphasizing the need for standardization. Ultimately, this work advocates for a holistic approach to IoT security, where robust, adaptable solutions are developed to safeguard against the evolving landscape of cyber threats.References
S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: a review,” J. Big Data, vol. 6, no. 1, p. 111, Dec. 2019, doi: 10.1186/s40537-019-0268-2.
S. Nižetić, P. Šolić, D. López-de-Ipiña González-de-Artaza, and L. Patrono, “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future,” J. Clean. Prod., vol. 274, p. 122877, Nov. 2020, doi: 10.1016/j.jclepro.2020.122877.
B. I. Mukhtar, M. S. Elsayed, A. D. Jurcut, and M. A. Azer, “IoT Vulnerabilities and Attacks: SILEX Malware Case Study,” Symmetry (Basel)., vol. 15, no. 11, p. 1978, Oct. 2023, doi: 10.3390/sym15111978.
U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Comput. Sci. Rev., vol. 44, p. 100467, May 2022, doi: 10.1016/j.cosrev.2022.100467.
E. H. Park, “Impact of Data Breaches on Different Sectors over Time: Stock Market Reaction,” Capitol Technology University, 2024. [Online]. Available: https://search.proquest.com/openview/01a71a19e0925f784746b3b1a2c83878/1?pq-origsite=gscholar&cbl=18750&diss=y
P. Williams, I. K. Dutta, H. Daoud, and M. Bayoumi, “A survey on security in internet of things with a focus on the impact of emerging technologies,” Internet of Things, vol. 19, p. 100564, Aug. 2022, doi: 10.1016/j.iot.2022.100564.
J.-P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Ethical hacking for IoT: Security issues, challenges, solutions and recommendations,” Internet Things Cyber-Physical Syst., vol. 3, pp. 280–308, 2023, doi: 10.1016/j.iotcps.2023.04.002.
B. Sutheekshan, S. Basheer, G. Thangavel, and O. P. Sharma, “Evolution of Malware Targeting IoT Devices and Botnet formation,” in 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), Feb. 2024, vol. 5, pp. 1415–1422. doi: 10.1109/IC2PCT60090.2024.10486705.
N. S. S, D. M. Anna, V. M N, and S. R. Kota, “Enabling Lightweight Device Authentication in Message Queuing Telemetry Transport Protocol,” IEEE Internet Things J., vol. 11, no. 9, pp. 15792–15807, May 2024, doi: 10.1109/JIOT.2024.3349394.
M. Ahmid and O. Kazar, “A Comprehensive Review of the Internet of Things Security,” J. Appl. Secur. Res., vol. 18, no. 3, pp. 289–305, Jul. 2023, doi: 10.1080/19361610.2021.1962677.
S. Choudhary and G. Meena, “Internet of Things: Protocols, Applications and Security Issues,” Procedia Comput. Sci., vol. 215, pp. 274–288, Dec. 2022, doi: 10.1016/j.procs.2022.12.030.
P. Sharma, M. Kherajani, D. Jain, and D. Patel, “A Study of Routing Protocols, Security Issues and Attacks in Network Layer of Internet of Things Framework,” in 2nd International Conference on Data, Engineering and Applications (IDEA), Feb. 2020, pp. 1–6. doi: 10.1109/IDEA49133.2020.9170741.
C. Bayılmış, M. A. Ebleme, Ü. Çavuşoğlu, K. Küçük, and A. Sevin, “A survey on communication protocols and performance evaluations for Internet of Things,” Digit. Commun. Networks, vol. 8, no. 6, pp. 1094–1104, Dec. 2022, doi: 10.1016/j.dcan.2022.03.013.
H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, “A survey on internet of things security: Requirements, challenges, and solutions,” Internet of Things, vol. 14, p. 100129, Jun. 2021, doi: 10.1016/j.iot.2019.100129.
A. Rizzardi, S. Sicari, and A. Coen-Porisini, “Analysis on functionalities and security features of Internet of Things related protocols,” Wirel. Networks, vol. 28, no. 7, pp. 2857–2887, Oct. 2022, doi: 10.1007/s11276-022-02999-7.
N. A. Khan, A. Awang, and S. A. A. Karim, “Security in Internet of Things: A Review,” IEEE Access, vol. 10, pp. 104649–104670, Dec. 2022, doi: 10.1109/ACCESS.2022.3209355.
P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” J. Electr. Comput. Eng., vol. 2017, no. 1, pp. 1–25, Dec. 2017, doi: 10.1155/2017/9324035.
A. Jurcut, T. Niculcea, P. Ranaweera, and N.-A. Le-Khac, “Security Considerations for Internet of Things: A Survey,” SN Comput. Sci., vol. 1, no. 4, p. 193, Dec. 2020, doi: 10.1007/s42979-020-00201-3.
P. K. Sadhu, V. P. Yanambaka, and A. Abdelgawad, “Internet of Things: Security and Solutions Survey,” Sensors, vol. 22, no. 19, p. 7433, Sep. 2022, doi: 10.3390/s22197433.
R. Sharma and R. Arya, “Security threats and measures in the Internet of Things for smart city infrastructure: A state of art,” Trans. Emerg. Telecommun. Technol., vol. 34, no. 11, p. e4571, Nov. 2023, doi: 10.1002/ett.4571.
Rachit, S. Bhatt, and P. R. Ragiri, “Security trends in Internet of Things: a survey,” SN Appl. Sci., vol. 3, no. 1, p. 121, Jan. 2021, doi: 10.1007/s42452-021-04156-9.
A. K. Abed and A. Anupam, “Review of security issues in Internet of Things and artificial intelligence‐driven solutions,” Secur. Priv., vol. 6, no. 3, p. e285, May 2023, doi: 10.1002/spy2.285.
M. N. Bhuiyan, M. M. Rahman, M. M. Billah, and D. Saha, “Internet of Things (IoT): A Review of Its Enabling Technologies in Healthcare Applications, Standards Protocols, Security, and Market Opportunities,” IEEE Internet Things J., vol. 8, no. 13, pp. 10474–10498, Jul. 2021, doi: 10.1109/JIOT.2021.3062630.
B. B. Gupta and M. Quamara, “An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols,” Concurr. Comput. Pract. Exp., vol. 32, no. 21, p. e4946, Nov. 2020, doi: 10.1002/cpe.4946.
D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, “Internet of things security: A top-down survey,” Comput. Networks, vol. 141, pp. 199–221, Aug. 2018, doi: 10.1016/j.comnet.2018.03.012.
H. D. Zubaydi, P. Varga, and S. Molnár, “Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review,” Sensors, vol. 23, no. 2, p. 788, Jan. 2023, doi: 10.3390/s23020788.
S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet of Things (IoT) communication protocols: Review,” in 2017 8th International Conference on Information Technology (ICIT), May 2017, pp. 685–690. doi: 10.1109/ICITECH.2017.8079928.
C. Mahmoud and S. Aouag, “Security for Internet of Things,” in Proceedings of the 9th International Conference on Information Systems and Technologies, Mar. 2019, pp. 1–6. doi: 10.1145/3361570.3361622.
A. Zamfiroiu et al., “IoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data,” Proc. Int. Conf. Bus. Excell., vol. 14, no. 1, pp. 1109–1120, Jul. 2020, doi: 10.2478/picbe-2020-0104.
P. Manna and R. K. Das, “Scalability in internet of things: Techniques, challenges and solutions,” Int. J. Res. Eng. Appl. Manag., vol. 7, no. 01, pp. 2454–9150, 2021, doi: 10.35291/2454-9150.2021.0175.
K. P. Satamraju and M. B, “Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare,” Sensors, vol. 20, no. 5, p. 1389, Mar. 2020, doi: 10.3390/s20051389.
U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks,” in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE ’08), Jan. 2008, pp. 791–798. doi: 10.1109/COMSWA.2008.4554519.
H. C. Hwang, J. Park, and J. G. Shon, “Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT,” Wirel. Pers. Commun., vol. 91, no. 4, pp. 1765–1777, Dec. 2016, doi: 10.1007/s11277-016-3398-2.
M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar, “Secure MQTT for Internet of Things (IoT),” in 2015 Fifth International Conference on Communication Systems and Network Technologies, Apr. 2015, pp. 746–751. doi: 10.1109/CSNT.2015.16.
M. A. Spohn, “On MQTT Scalability in the Internet of Things: Issues, Solutions, and Future Directions,” J. Electron. Electr. Eng., p. 4, Oct. 2022, doi: 10.37256/jeee.1120221687.
J. Ali, M. H. Zafar, C. Hewage, R. Hassan, and R. Asif, “Mathematical Modeling and Validation of Retransmission-Based Mutant MQTT for Improving Quality of Service in Developing Smart Cities,” Sensors, vol. 22, no. 24, p. 9751, Dec. 2022, doi: 10.3390/s22249751.
T. Yokotani and Y. Sasaki, “Comparison with HTTP and MQTT on required network resources for IoT,” in 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Sep. 2016, pp. 1–6. doi: 10.1109/ICCEREC.2016.7814989.
Y. M. Algani et al., “Integration of Internet Protocol and Embedded System On IoT Device Automation,” Research Square. Dec. 17, 2021. doi: 10.21203/rs.3.rs-947704/v1.
D. Gourley and B. Totty, HTTP: the definitive guide. “ O’Reilly Media, Inc.,” 2002. [Online]. Available: https://books.google.com/books?hl=fr&lr=&id=3EybAgAAQBAJ&oi=fnd&pg=PR5&dq=D.+Gourley+and+B.+Totty,+HTTP:+the+definitive+guide.++O’Reilly+Media,+Inc.,+2002.+Accessed:+Oct.+26,+2024.+%255BOnline%255D.+Available:+https://books.google.com/books%253Fhl%253Dfr%2526lr%253D%25
W. M. Shbair, T. Cholez, J. Francois, and I. Chrisment, “A Survey of HTTPS Traffic and Services Identification Approaches,” arXiv. arXiv, Aug. 19, 2020. [Online]. Available: http://arxiv.org/abs/2008.08339
B. Wukkadada, K. Wankhede, R. Nambiar, and A. Nair, “Comparison with HTTP and MQTT In Internet of Things (IoT),” in 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Jul. 2018, pp. 249–253. doi: 10.1109/ICIRCA.2018.8597401.
M. Bouzidi, N. Gupta, F. A. Cheikh, A. Shalaginov, and M. Derawi, “A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey,” IEEE Access, vol. 10, pp. 101362–101384, Dec. 2022, doi: 10.1109/ACCESS.2022.3207472.
L. Duong, “The techniques of IoT and it’s applications for smart homes: internet of things techniques and standards for building smart homes,” 2023. [Online]. Available: https://lutpub.lut.fi/handle/10024/165971
I. Ishaq, J. Hoebeke, F. Van den Abeele, J. Rossey, I. Moerman, and P. Demeester, “Flexible Unicast-Based Group Communication for CoAP-Enabled Devices,” Sensors, vol. 14, no. 6, pp. 9833–9877, Jun. 2014, doi: 10.3390/s140609833.
I. Ishaq, J. Hoebeke, I. Moerman, and P. Demeester, “Experimental Evaluation of Unicast and Multicast CoAP Group Communication,” Sensors, vol. 16, no. 7, p. 1137, Jul. 2016, doi: 10.3390/s16071137.
S. Arvind and V. A. Narayanan, “An Overview of Security in CoAP: Attack and Analysis,” in 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Mar. 2019, pp. 655–660. doi: 10.1109/ICACCS.2019.8728533.
P. M. Kumar and U. D. Gandhi, “Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application,” J. Supercomput., vol. 76, no. 6, pp. 3963–3983, Jun. 2020, doi: 10.1007/s11227-017-2169-5.
D. Rathod and S. Patil, “Security analysis of constrained application protocol (CoAP): IoT protocol,” Int. J. Adv. Stud. Comput. Sci. Eng., vol. 6, no. 8, p. 37, Dec. 2017, [Online]. Available: https://www.researchgate.net/profile/Digvijaysinh-Rathod-2/publication/321534413_Security_Analysis_of_Constrained_Application_Protocol_CoAP_IoT_Protocol/links/5a26ca6fa6fdcc8e866e4c34/Security-Analysis-of-Constrained-Application-Protocol-CoAP-IoT-Protocol
M. Kolisnyk, “Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems,” Radioelectron. Comput. Syst., no. 1, pp. 133–149, Feb. 2021, doi: 10.32620/reks.2021.1.12.
A. Cho, T. Kim, C. K. Kim, S. Choi, and S. Lee, “IoT data dissemination scheme for reducing delay in multi-broker environments,” Internet of Things, vol. 25, p. 101025, Apr. 2024, doi: 10.1016/j.iot.2023.101025.
J. Roldán-Gómez, J. Carrillo-Mondéjar, J. M. Castelo Gómez, and S. Ruiz-Villafranca, “Security Analysis of the MQTT-SN Protocol for the Internet of Things,” Appl. Sci., vol. 12, no. 21, p. 10991, Oct. 2022, doi: 10.3390/app122110991.
P. Papageorgas et al., “Wireless Sensor Networking Architecture of Polytropon: An Open Source Scalable Platform for the Smart Grid,” Energy Procedia, vol. 50, pp. 270–276, Dec. 2014, doi: 10.1016/j.egypro.2014.06.033.
D. Z. Fawwaz, S.-H. Chung, C.-W. Ahn, and W.-S. Kim, “Optimal Distributed MQTT Broker and Services Placement for SDN-Edge Based Smart City Architecture,” Sensors, vol. 22, no. 9, p. 3431, Apr. 2022, doi: 10.3390/s22093431.
C.-S. Park and H.-M. Nam, “Security Architecture and Protocols for Secure MQTT-SN,” IEEE Access, vol. 8, pp. 226422–226436, Dec. 2020, doi: 10.1109/ACCESS.2020.3045441.
A. Cimmino et al., “A scalable, secure, and semantically interoperable client for cloud-enabled Demand Response,” Futur. Gener. Comput. Syst., vol. 141, pp. 54–66, Apr. 2023, doi: 10.1016/j.future.2022.11.004.
E. Shahri, P. Pedreiras, and L. Almeida, “Extending MQTT with Real-Time Communication Services Based on SDN,” Sensors, vol. 22, no. 9, p. 3162, Apr. 2022, doi: 10.3390/s22093162.
I. Ungurean and N. C. Gaitan, “A Software Architecture for the Industrial Internet of Things—A Conceptual Model,” Sensors, vol. 20, no. 19, p. 5603, Sep. 2020, doi: 10.3390/s20195603.
S. Saxena, H. E. Z. Farag, and N. El-Taweel, “A distributed communication framework for smart Grid control applications based on data distribution service,” Electr. Power Syst. Res., vol. 201, p. 107547, Dec. 2021, doi: 10.1016/j.epsr.2021.107547.
R. Cruz Huacarpuma, R. De Sousa Junior, M. De Holanda, R. De Oliveira Albuquerque, L. García Villalba, and T.-H. Kim, “Distributed Data Service for Data Management in Internet of Things Middleware,” Sensors, vol. 17, no. 5, p. 977, Apr. 2017, doi: 10.3390/s17050977.
W. Sim, B. Song, J. Shin, and T. Kim, “Data Distribution Service Converter Based on the Open Platform Communications Unified Architecture Publish–Subscribe Protocol,” Electronics, vol. 10, no. 20, p. 2524, Oct. 2021, doi: 10.3390/electronics10202524.
A. Alaerjan, “Formalizing the Semantics of DDS QoS Policies for Improved Communications in Distributed Smart Grid Applications,” Electronics, vol. 12, no. 10, p. 2246, May 2023, doi: 10.3390/electronics12102246.
B. Al-Madani, A. Al-Roubaiey, and Z. A. Baig, “Real-Time QoS-Aware Video Streaming: A Comparative and Experimental Study,” Adv. Multimed., vol. 2014, pp. 1–11, 2014, doi: 10.1155/2014/164940.
A. Cilfone, L. Davoli, L. Belli, and G. Ferrari, “Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies,” Futur. Internet, vol. 11, no. 4, p. 99, Apr. 2019, doi: 10.3390/fi11040099.
K. Liu, “Performance evaluation of zigbee network for embedded electricity meters.” Dec. 17, 2009. [Online]. Available: https://www.diva-portal.org/smash/record.jsf?pid=diva2:571735
S. Tsakalidis, G. Tsoulos, D. Kontaxis, and G. Athanasiadou, “Design and Implementation of a Versatile OpenHAB IoT Testbed with a Variety of Wireless Interfaces and Sensors,” Telecom, vol. 4, no. 3, pp. 597–610, Aug. 2023, doi: 10.3390/telecom4030026.
I. Ahonen, “Internet of Things: Wireless Technologies in Home Automation Solutions,” 2015. [Online]. Available: https://jyx.jyu.fi/handle/123456789/45101
C. Braghin, M. Lilli, and E. Riccobene, “A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study,” Comput. Secur., vol. 127, p. 103037, Apr. 2023, doi: 10.1016/j.cose.2022.103037.
S. Chakraborty, K. Mali, and S. Chatterjee, “Edge Computing Based Conceptual Framework for Smart Health Care Applications Using Z-Wave and Homebased Wireless Sensor Network,” in Mobile Edge Computing, A. Mukherjee, D. De, S. K. Ghosh, and R. Buyya, Eds. Cham: Springer International Publishing, 2021, pp. 387–414. doi: 10.1007/978-3-030-69893-5_16.
N. M. Obiri and H. Shikunzi, “Long-Range Wide Area Network (LoRa-WAN) Connectivity and Range Evaluation in a Rural Setting,” Int. J. Comput. Appl., vol. 185, no. 3, pp. 61–67, Apr. 2023, doi: 10.5120/ijca2023922699.
E. Sisinni, D. F. Carvalho, and P. Ferrari, “Emergency Communication in IoT Scenarios by Means of a Transparent LoRaWAN Enhancement,” IEEE Internet Things J., vol. 7, no. 10, pp. 10684–10694, Oct. 2020, doi: 10.1109/JIOT.2020.3011262.
C. Delgado, J. M. Sanz, C. Blondia, and J. Famaey, “Batteryless LoRaWAN Communications Using Energy Harvesting: Modeling and Characterization,” IEEE Internet Things J., vol. 8, no. 4, pp. 2694–2711, Feb. 2021, doi: 10.1109/JIOT.2020.3019140.
M. Jouhari, N. Saeed, M.-S. Alouini, and E. M. Amhoud, “A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges,” IEEE Commun. Surv. Tutorials, vol. 25, no. 3, pp. 1841–1876, 2023, doi: 10.1109/COMST.2023.3274934.
A. Seferagić, J. Famaey, E. De Poorter, and J. Hoebeke, “Survey on Wireless Technology Trade-Offs for the Industrial Internet of Things,” Sensors, vol. 20, no. 2, p. 488, Jan. 2020, doi: 10.3390/s20020488.
H. Hanaffi, R. Mohamad, S. I. Suliman, M. Kassim, N. M. Anas, and A. Z. A. Bakar, “Single-Channel LoRaWAN Gateway for Remote Indoor Monitoring System: An Experimental,” in 2020 8th International Electrical Engineering Congress (iEECON), Mar. 2020, pp. 1–4. doi: 10.1109/iEECON48109.2020.229479.
H. Alqurashi, F. Bouabdallah, and E. Khairullah, “SCAP SigFox: A Scalable Communication Protocol for Low-Power Wide-Area IoT Networks,” Sensors, vol. 23, no. 7, p. 3732, Apr. 2023, doi: 10.3390/s23073732.
R. Brotzu, P. Aru, M. Fadda, and D. Giusto, “Urban SigFox-based Mobility System,” in 2021 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Aug. 2021, pp. 1–4. doi: 10.1109/BMSB53066.2021.9547120.
A. Ortega i Blasi, “Evaluating Thread protocol in the framework of Matter,” Universitat Politècnica de Catalunya, 2022. [Online]. Available: https://upcommons.upc.edu/handle/2117/376955
H.-S. Kim, S. Kumar, and D. E. Culler, “Thread/OpenThread: A Compromise in Low-Power Wireless Multihop Network Architecture for the Internet of Things,” IEEE Commun. Mag., vol. 57, no. 7, pp. 55–61, Jul. 2019, doi: 10.1109/MCOM.2019.1800788.
I. Unwala, Z. Taqvi, and J. Lu, “Thread: An IoT Protocol,” in 2018 IEEE Green Technologies Conference (GreenTech), Apr. 2018, pp. 161–167. doi: 10.1109/GreenTech.2018.00037.
F. Pereira, R. Correia, P. Pinho, S. I. Lopes, and N. B. Carvalho, “Challenges in Resource-Constrained IoT Devices: Energy and Communication as Critical Success Factors for Future IoT Deployment,” Sensors, vol. 20, no. 22, p. 6420, Nov. 2020, doi: 10.3390/s20226420.
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, “IoT Privacy and Security: Challenges and Solutions,” Appl. Sci., vol. 10, no. 12, p. 4102, Jun. 2020, doi: 10.3390/app10124102.
S. R. Siraparapu and S. Azad, “Securing the IoT Landscape: A Comprehensive Review of Secure Systems in the Digital Era,” e-Prime - Adv. Electr. Eng. Electron. Energy, vol. 10, p. 100798, Dec. 2024, doi: 10.1016/j.prime.2024.100798.
M. Sookhak, H. Tang, Y. He, and F. R. Yu, “Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges,” IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1718–1743, 2019, doi: 10.1109/COMST.2018.2867288.
H. Xu, Y. Li, O. Balogun, S. Wu, Y. Wang, and Z. Cai, “Security Risks Concerns of Generative AI in the IoT,” IEEE Internet Things Mag., vol. 7, no. 3, pp. 62–67, May 2024, doi: 10.1109/IOTM.001.2400004.
C. Theisen, N. Munaiah, M. Al-Zyoud, J. C. Carver, A. Meneely, and L. Williams, “Attack surface definitions: A systematic literature review,” Inf. Softw. Technol., vol. 104, pp. 94–103, Dec. 2018, doi: 10.1016/j.infsof.2018.07.008.
K. Kimani, V. Oduol, and K. Langat, “Cyber security challenges for IoT-based smart grid networks,” Int. J. Crit. Infrastruct. Prot., vol. 25, pp. 36–49, Jun. 2019, doi: 10.1016/j.ijcip.2019.01.001.
M. Msgna, “Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures,” J. Surveillance, Secur. Saf., vol. 3, no. 4, pp. 150–73, Dec. 2022, doi: 10.20517/jsss.2022.07.
A. Alhusayni, V. Thayananthan, A. Albeshri, and S. Alghamdi, “Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology,” Electronics, vol. 12, no. 20, p. 4314, Oct. 2023, doi: 10.3390/electronics12204314.
W. Fei, H. Ohno, and S. Sampalli, “A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions,” ACM Comput. Surv., vol. 56, no. 5, pp. 1–40, May 2024, doi: 10.1145/3625094.
Unit 42, “2020 Unit 42 IoT Threat Report,” Unit 42. Dec. 17, 2020. [Online]. Available: https://unit42.paloaltonetworks.com/iot-threat-report-2020/
J. Coelho and L. Nogueira, “Enabling Processing Power Scalability with Internet of Things (IoT) Clusters,” Electronics, vol. 11, no. 1, p. 81, Dec. 2021, doi: 10.3390/electronics11010081.
N. S. Mtetwa, P. Tarwireyi, A. M. Abu-Mahfouz, and M. O. Adigun, “Secure Firmware Updates in the Internet of Things: A survey,” in 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC), Nov. 2019, pp. 1–7. doi: 10.1109/IMITEC45504.2019.9015845.
H. Taherdoost, “Security and internet of things: benefits, challenges, and future perspectives,” Electronics, vol. 12, no. 8, p. 1901, Dec. 2023, [Online]. Available: https://www.mdpi.com/2079-9292/12/8/1901
G. Vardakis, G. Hatzivasilis, E. Koutsaki, and N. Papadakis, “Review of Smart-Home Security Using the Internet of Things,” Electronics, vol. 13, no. 16, p. 3343, Aug. 2024, doi: 10.3390/electronics13163343.
I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, and W. Ni, “Anatomy of Threats to the Internet of Things,” IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1636–1675, 2019, doi: 10.1109/COMST.2018.2874978.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Jean Pierre Ntayagabiri, Youssef Bentaleb, Jeremie Ndikumagenge, Hind EL Makhtoum
This work is licensed under a Creative Commons Attribution 4.0 International License.