Skip to main content

Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2021)

Abstract

The Internet of Things (IoT), often known as the Internet of Everything, is a new technological paradigm visualized as a worldwide network of interconnected machines. IoT brings another dimension into Information Technology (IT), where machines can communicate with various machines and humans. Researchers and IT industry produced various IoT devices, architectures. Different ways are introduced to implement and use IoT concepts. IoT is getting more intention in ideas like smart homes and smart cities, raising security concerns. This article aims to gather the reported security issues, the classification of those issues, and the solutions that were provided against those IoT security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ashton, K.: That ‘internet of things’ thing. RFID J. 22, 97–114 (2009)

    Google Scholar 

  2. Alqourabah, H., Muneer, A., Fati, S.M.: A smart fire detection system using IoT technology with automatic water sprinkler. Int. J. Electr. Comput. Eng. 11, 2994–3002 (2021)

    Google Scholar 

  3. Shahzad, K., Shareef, K., Ali, R.F., Nawab, R.M.A., Abid, A.: Generating process model collection with diverse label and structural features. In: 2016 Sixth International Conference on Innovative Computing Technology (INTECH), pp. 644–649. IEEE (2016)

    Google Scholar 

  4. Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on internet of things. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 2944–2947. IEEE (2011)

    Google Scholar 

  5. Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Proceedings of the 18th Symposium on Communications & Networking, pp. 8–15 (2015)

    Google Scholar 

  6. Zhang, Z.-K., Cho, M.C.Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230–234. IEEE (2014)

    Google Scholar 

  7. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667. IEEE (2013)

    Google Scholar 

  8. Muneer, A., Fati, S.M., Fuddah, S.: Smart health monitoring system using IoT based smart fitness mirror. Telkomnika 18, 317–331 (2020)

    Article  Google Scholar 

  9. Naseer, S., Ali, R.F., Muneer, A., Fati, S.M.: IAmideV-deep: valine amidation site prediction in proteins using deep learning and pseudo amino acid compositions. Symmetry (Basel) 13, 560 (2021)

    Article  Google Scholar 

  10. Naseer, S., Ali, R.F., Fati, S.M., Muneer, A.: iNitroY-deep: computational identification of nitrotyrosine sites to supplement carcinogenesis studies using deep learning. IEEE Access 9, 73624–73640 (2021)

    Article  Google Scholar 

  11. Alshohoumi, F., Sarrab, M., AlHamadani, A., Al-Abri, D.: Systematic review of existing IoT architectures security and privacy issues and concerns. Int. J. Adv. Comput. Sci. Appl. 10, 232–251 (2019)

    Google Scholar 

  12. Fati, S.M., Muneer, A., Mungur, D., Badawi, A.: Integrated health monitoring system using GSM and IoT. In: 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), pp. 1–7. IEEE (2018)

    Google Scholar 

  13. Muneer, A., Fati, S.M.: Automated health monitoring system using advanced technology. J. Inf. Technol. Res. 12, 104–132 (2019)

    Article  Google Scholar 

  14. Qadri, I., Muneer, A., Fati, S.M.: Automatic robotic scanning and inspection mechanism for mines using IoT. In: IOP Conference Series: Materials Science and Engineering, p. 12001. IOP Publishing (2021)

    Google Scholar 

  15. Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Comput. 3, 64–71 (2016)

    Article  Google Scholar 

  16. Rughoobur, P., Nagowah, L.: A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In: 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp. 811–817. IEEE (2017)

    Google Scholar 

  17. HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Futur. Gener. Comput. Syst. 85, 88–96 (2018)

    Article  Google Scholar 

  18. Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32–37. IEEE (2017)

    Google Scholar 

  19. Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 19, 326 (2019)

    Article  Google Scholar 

  20. Alessandro, S., Felix, G., Mauro, C., Jens-Matthias, B.: Raspberry Pi IDS: a fruitful intrusion detection system for IoT. In: 2017 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), pp. 1–9 (2016)

    Google Scholar 

  21. Thirumalai, C., Kar, H.: Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1–6. IEEE (2017)

    Google Scholar 

  22. Pham, C., Lim, Y., Tan, Y.: Management architecture for heterogeneous IoT devices in home network. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp. 1–5. IEEE (2016)

    Google Scholar 

  23. Ham, H.-S., Kim, H.-H., Kim, M.-S., Choi, M.-J.: Linear SVM-based android malware detection for reliable IoT services. J. Appl. Math. 2014, 10p. (2014)

    Google Scholar 

  24. Sharma, V., Kim, J., Kwon, S., You, I., Lee, K., Yim, K.: A framework for mitigating zero-day attacks in IoT. arXiv Prepr. arXiv:1804.05549 (2018)

  25. Siby, S., Maiti, R.R., Tippenhauer, N.O.: IoTScanner: detecting privacy threats in IoT neighborhoods. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 23–30 (2017)

    Google Scholar 

  26. Rizal, R., Riadi, I., Prayudi, Y.: Network forensics for detecting flooding attack on internet of things (IoT) device. Int. J. Cyber-Secur. Digit. Forensics 7, 382–390 (2018)

    Google Scholar 

  27. Takarabt, S., et al.: Cache-timing attacks still threaten IoT devices. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E. (eds.) C2SI 2019. LNCS, vol. 11445, pp. 13–30. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16458-4_2

    Chapter  Google Scholar 

  28. Brun, O., Yin, Y., Gelenbe, E., Kadioglu, Y.M., Augusto-Gonzalez, J., Ramos, M.: Deep learning with dense random neural networks for detecting attacks against IoT-connected home environments. In: Gelenbe, E., et al. (eds.) Euro-CYBERSEC 2018. Communications in Computer and Information Science, vol. 821, pp. 79–89. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95189-8_8

    Chapter  Google Scholar 

  29. Rathore, S., Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018)

    Article  Google Scholar 

  30. Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Rehman, M., Sohail, A.: Information security behavior and information security policy compliance: a systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci. 11, 3383 (2021)

    Article  Google Scholar 

  31. Dong, K., Ali, R.F., Dominic, P.D.D., Ali, S.E.A.: The effect of organizational information security climate on information security policy compliance: the mediating effect of social bonding towards healthcare nurses. Sustainability 13, 2800 (2021)

    Article  Google Scholar 

  32. Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Secur. Its Appl. 9, 205–216 (2015)

    Google Scholar 

  33. Liu, C., Zhang, Y., Zhang, H.: A novel approach to IoT security based on immunology. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 771–775. IEEE (2013)

    Google Scholar 

  34. Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)

    Article  Google Scholar 

  35. Ali, R.F., Dominic, P.D.D., Ali, K.: Organizational governance, social bonds and information security policy compliance: a perspective towards oil and gas employees. Sustainability 12, 8576 (2020)

    Article  Google Scholar 

  36. Shahzad, K., et al.: A process model collection and gold standard correspondences for process model matching. IEEE Access 7, 30708–30723 (2019)

    Article  Google Scholar 

  37. Ali, R.F., Dominic, P., Karunakaran, P.K.: Information security policy and compliance in oil and gas organizations—a pilot study. Solid State Technol. 63, 1275–1282 (2020)

    Google Scholar 

  38. Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Naseer, S.: Information security behavior of IT professionals (role of polices and compliance). Solid State Technol. 63, 21601–21608 (2020)

    Google Scholar 

  39. Naseer, S., Faizan Ali, R., Dominic, P.D.D., Saleem, Y.: Learning representations of network traffic using deep neural networks for network anomaly detection: a perspective towards oil and gas IT infrastructures. Symmetry (Basel) 12, 1882 (2020)

    Article  Google Scholar 

  40. Muneer, A., Fati, S.M.: A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Futur. Internet. 12, 187 (2020)

    Article  Google Scholar 

  41. Naseer, S., Ali, R.F., Khan, Y.D., Dominic, P.D.D.: iGluK-deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions. J. Biomol. Struct. Dyn. 1–14 (2021)

    Google Scholar 

  42. Muneer, A., Ali, R.F., Fati, S.M., Naseer, S.: COVID-19 recognition using self-supervised learning approach in three new computed tomography databases. J. Hunan Univ. Nat. Sci. 48, 227–234 (2021)

    Google Scholar 

  43. Muneer, A., Fati, S.M.: Efficient and automated herbs classification approach based on shape and texture features using deep learning. IEEE Access 8, 196747–196764 (2020)

    Article  Google Scholar 

  44. Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), pp. 163–167. IEEE (2015)

    Google Scholar 

  45. Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), pp. 321–326. IEEE (2016)

    Google Scholar 

  46. Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018)

    Google Scholar 

  47. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)

    Google Scholar 

  48. Ahemd, M.M., Shah, M.A., Wahid, A.: IoT security: a layered approach for attacks & defenses. In: 2017 international conference on Communication Technologies (ComTech), pp. 104–110. IEEE (2017)

    Google Scholar 

  49. Ibrahim, A., Sadeghi, A.-R., Tsudik, G., Zeitouni, S.: DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 171–182 (2016)

    Google Scholar 

  50. ul Sami, I., Ahmad, M.B., Asif, M., Ullah, R.: DoS/DDoS detection for E-healthcare in Internet of Things. Int. J. Adv. Comput. Sci. Appl. 9, 297–300 (2018)

    Google Scholar 

  51. Arasteh, H., et al.: IoT-based smart cities: a survey. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), pp. 1–6. IEEE (2016)

    Google Scholar 

  52. Palani, K., Holt, E., Smith, S.: Invisible and forgotten: zero-day blooms in the IoT. In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1–6. IEEE (2016)

    Google Scholar 

  53. Vashi, S., Ram, J., Modi, J., Verma, S., Prakash, C.: Internet of Things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 492–496. IEEE (2017)

    Google Scholar 

  54. Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of Things (IoT) communication protocols. In: 2017 8th International Conference on Information Technology (ICIT), pp. 685–690. IEEE (2017)

    Google Scholar 

  55. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Comput. (Long. Beach. Calif.) 50, 80–84 (2017)

    Google Scholar 

  56. Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519–524. IEEE (2016)

    Google Scholar 

  57. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amgad Muneer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ali, R.F., Muneer, A., Dominic, P.D.D., Taib, S.M., Ghaleb, E.A.A. (2021). Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8059-5_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8058-8

  • Online ISBN: 978-981-16-8059-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics