Abstract
The Internet of Things (IoT), often known as the Internet of Everything, is a new technological paradigm visualized as a worldwide network of interconnected machines. IoT brings another dimension into Information Technology (IT), where machines can communicate with various machines and humans. Researchers and IT industry produced various IoT devices, architectures. Different ways are introduced to implement and use IoT concepts. IoT is getting more intention in ideas like smart homes and smart cities, raising security concerns. This article aims to gather the reported security issues, the classification of those issues, and the solutions that were provided against those IoT security issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashton, K.: That ‘internet of things’ thing. RFID J. 22, 97–114 (2009)
Alqourabah, H., Muneer, A., Fati, S.M.: A smart fire detection system using IoT technology with automatic water sprinkler. Int. J. Electr. Comput. Eng. 11, 2994–3002 (2021)
Shahzad, K., Shareef, K., Ali, R.F., Nawab, R.M.A., Abid, A.: Generating process model collection with diverse label and structural features. In: 2016 Sixth International Conference on Innovative Computing Technology (INTECH), pp. 644–649. IEEE (2016)
Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on internet of things. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 2944–2947. IEEE (2011)
Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Proceedings of the 18th Symposium on Communications & Networking, pp. 8–15 (2015)
Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE (2014)
Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE (2013)
Muneer, A., Fati, S.M., Fuddah, S.: Smart health monitoring system using IoT based smart fitness mirror. Telkomnika 18, 317–331 (2020)
Naseer, S., Ali, R.F., Muneer, A., Fati, S.M.: IAmideV-deep: valine amidation site prediction in proteins using deep learning and pseudo amino acid compositions. Symmetry (Basel) 13, 560 (2021)
Naseer, S., Ali, R.F., Fati, S.M., Muneer, A.: iNitroY-deep: computational identification of nitrotyrosine sites to supplement carcinogenesis studies using deep learning. IEEE Access 9, 73624–73640 (2021)
Alshohoumi, F., Sarrab, M., AlHamadani, A., Al-Abri, D.: Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl. 10, 232–251 (2019)
Fati, S.M., Muneer, A., Mungur, D., Badawi, A.: Integrated health monitoring system using GSM and IoT. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), pp. 1–7. IEEE (2018)
Muneer, A., Fati, S.M.: Automated health monitoring system using advanced technology. J. Inf. Technol. Res. 12, 104–132 (2019)
Qadri, I., Muneer, A., Fati, S.M.: Automatic robotic scanning and inspection mechanism for mines using IoT. In: IOP Conference Series: Materials Science and Engineering, p. 12001. IOP Publishing (2021)
Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput. 3, 64–71 (2016)
Rughoobur, P., Nagowah, L.: A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp. 811–817. IEEE (2017)
HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)
Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32–37. IEEE (2017)
Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 19, 326 (2019)
Alessandro, S., Felix, G., Mauro, C., Jens-Matthias, B.: Raspberry Pi IDS: a fruitful intrusion detection system for IoT. In: 2017 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), pp. 1–9 (2016)
Thirumalai, C., Kar, H.: Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1–6. IEEE (2017)
Pham, C., Lim, Y., Tan, Y.: Management architecture for heterogeneous IoT devices in home network. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1–5. IEEE (2016)
Ham, H.-S., Kim, H.-H., Kim, M.-S., Choi, M.-J.: Linear SVM-based android malware detection for reliable IoT services. J. Appl. Math. 2014, 10p. (2014)
Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., Yim, K.: A framework for mitigating zero-day attacks in IoT. arXiv Prepr. arXiv:1804.05549 (2018)
Siby, S., Maiti, R.R., Tippenhauer, N.O.: IoTScanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 23–30 (2017)
Rizal, R., Riadi, I., Prayudi, Y.: Network forensics for detecting flooding attack on internet of things (IoT) device. Int. J. Cyber-Secur. Digit. Forensics 7, 382–390 (2018)
Takarabt, S., et al.: Cache-timing attacks still threaten IoT devices. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds.) C2SI 2019. LNCS, vol. 11445, pp. 13–30. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16458-4_2
Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. Communications in Computer and Information Science, vol. 821, pp. 79–89. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95189-8_8
Rathore, S., Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018)
Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Rehman, M., Sohail, A.: Information security behavior and information security policy compliance: a systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci. 11, 3383 (2021)
Dong, K., Ali, R.F., Dominic, P.D.D., Ali, S.E.A.: The effect of organizational information security climate on information security policy compliance: the mediating effect of social bonding towards healthcare nurses. Sustainability 13, 2800 (2021)
Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Its Appl. 9, 205–216 (2015)
Liu, C., Zhang, Y., Zhang, H.: A novel approach to IoT security based on immunology. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 771–775. IEEE (2013)
Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)
Ali, R.F., Dominic, P.D.D., Ali, K.: Organizational governance, social bonds and information security policy compliance: a perspective towards oil and gas employees. Sustainability 12, 8576 (2020)
Shahzad, K., et al.: A process model collection and gold standard correspondences for process model matching. IEEE Access 7, 30708–30723 (2019)
Ali, R.F., Dominic, P., Karunakaran, P.K.: Information security policy and compliance in oil and gas organizations—a pilot study. Solid State Technol. 63, 1275–1282 (2020)
Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Naseer, S.: Information security behavior of IT professionals (role of polices and compliance). Solid State Technol. 63, 21601–21608 (2020)
Naseer, S., Faizan Ali, R., Dominic, P.D.D., Saleem, Y.: Learning representations of network traffic using deep neural networks for network anomaly detection: a perspective towards oil and gas IT infrastructures. Symmetry (Basel) 12, 1882 (2020)
Muneer, A., Fati, S.M.: A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Futur. Internet. 12, 187 (2020)
Naseer, S., Ali, R.F., Khan, Y.D., Dominic, P.D.D.: iGluK-deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions. J. Biomol. Struct. Dyn. 1–14 (2021)
Muneer, A., Ali, R.F., Fati, S.M., Naseer, S.: COVID-19 recognition using self-supervised learning approach in three new computed tomography databases. J. Hunan Univ. Nat. Sci. 48, 227–234 (2021)
Muneer, A., Fati, S.M.: Efficient and automated herbs classification approach based on shape and texture features using deep learning. IEEE Access 8, 196747–196764 (2020)
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), pp. 163–167. IEEE (2015)
Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), pp. 321–326. IEEE (2016)
Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018)
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)
Ahemd, M.M., Shah, M.A., Wahid, A.: IoT security: a layered approach for attacks & defenses. In: 2017 international conference on Communication Technologies (ComTech), pp. 104–110. IEEE (2017)
Ibrahim, A., Sadeghi, A.-R., Tsudik, G., Zeitouni, S.: DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 171–182 (2016)
ul Sami, I., Ahmad, M.B., Asif, M., Ullah, R.: DoS/DDoS detection for E-healthcare in Internet of Things. Int. J. Adv. Comput. Sci. Appl. 9, 297–300 (2018)
Arasteh, H., et al.: IoT-based smart cities: a survey. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), pp. 1–6. IEEE (2016)
Palani, K., Holt, E., Smith, S.: Invisible and forgotten: zero-day blooms in the IoT. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6. IEEE (2016)
Vashi, S., Ram, J., Modi, J., Verma, S., Prakash, C.: Internet of Things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 492–496. IEEE (2017)
Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of Things (IoT) communication protocols. In: 2017 8th International Conference on Information Technology (ICIT), pp. 685–690. IEEE (2017)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Comput. (Long. Beach. Calif.) 50, 80–84 (2017)
Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519–524. IEEE (2016)
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ali, R.F., Muneer, A., Dominic, P.D.D., Taib, S.M., Ghaleb, E.A.A. (2021). Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-16-8059-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8058-8
Online ISBN: 978-981-16-8059-5
eBook Packages: Computer ScienceComputer Science (R0)