Abstract
Internet of things (IoT) is a world wide network and set of paradigms that are intended to allow communications between anything, anytime and anywhere. However, connected objects are in most cases vulnerable due to their constrained resources and the inherent IoT environment conditions, basically, the dynamic aspect, the heterogeneity, and the open and wireless medium of communication. Securing the IoT networks is still an open and challenging issue and the majority of traditional security mechanisms designed so far for Internet doesn’t satisfy IoT security requirements. Recently, the use of emergent technologies such as Artificial Intelligence mechanisms, Blockchain and IoTA as a promising solutions to solve security and privacy problems has shown a yield remarkable performance. In this paper we outline the security requirements proposed for the IoT. We provide a comprehensive taxonomy of the major security issues based on IoT architecture, attack implications and application areas. Furthermore, we tabulate and map the different countermeasures used to solve these threats taking into account new advances in security approaches. Finally, we discuss and compare the enumerated countermeasures for IoT security.

Similar content being viewed by others
References
Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access, 7, 82721–82743.
Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers and Electrical Engineering, 37(2), 147–159.
Otgonbayar, A., Pervez, Z., & Dahal, K. (2016). Toward anonymizing iot data streams via partitioning. In 2016 IEEE 13th international conference on mobile ad hoc and sensor systems (MASS) (pp. 331–336). IEEE.
Ahanger, T. A., & Aljumah, A. (2018). Internet of things: A comprehensive study of security issues and defense mechanisms. IEEE Access, 7, 11020–11028.
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., et al. (2017). Understanding the mirai botnet. In 26th USENIX security symposium (USENIX Security 17) (pp. 1093–1110).
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.
Lu, Y., & Da Xu, L. (2018). Internet of things (iot) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115.
Chae, S. H., Choi, W., Lee, J. H., & Quek, T. Q. (2014). Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. IEEE Transactions on Information Forensics and Security, 9(10), 1617–1628.
Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless sensor network. In International conference on network security and applications (pp. 268–280). Springer.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336–341). IEEE.
Xiao, L., Greenstein, L. J., Mandayam, N. B., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4(3), 492–503.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of things: The road ahead. Computer Networks, 76, 146–164.
Liao, C. H., Shuai, H. H., & Wang, L. C. (2018). Eavesdropping prevention for heterogeneous Internet of Things systems. In 2018 15th IEEE annual consumer communications and networking conference (CCNC) (pp. 1–2). IEEE.
Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663–667). IEEE.
Kim, H. (2008). Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. In 2008 International conference on convergence and hybrid information technology (pp. 796–801). IEEE.
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., & Wehrle, K. (2013). 6LoWPAN fragmentation attacks and mitigation mechanisms. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 55–66).
Ahmed, F., & Ko, Y. B. (2016). Mitigation of black hole attacks in routing protocol for low power and lossy networks. Security and Communication Networks, 9(18), 5143–5154.
Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal, 13(10), 3685–3692.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Kozlov, D., Veijalainen, J., & Ali, Y. (2012). Security and privacy threats in IoT architectures. In BODYNETS (pp. 256–262).
Li, S., & Da Xu, L. (2017). Securing the internet of things. Syngress.
Mathur, A., Newe, T., & Rao, M. (2016). Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors, 16(1), 118.
Kaur, P., & Gurm, J. S. (2016). Detect and prevent HELLO FLOOD attack using centralized technique in WSN. International Journal of Computer Science Engineering and Technology, 7(8), 379–381.
Lin, K. C., Chen, S. Y., & Hung, J. C. (2014). Botnet detection using support vector machines with artificial fish swarm algorithm. Journal of Applied Mathematics, 2014, 1–9.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51–58.
Zhang, Q., & Wang, X. (2009). SQL injections through back-end of RFID system. In 2009 International symposium on computer network and multimedia technology (pp. 1–4). IEEE.
Dorai, R., & Kannan, V. (2011). SQL injection-database attack revolution and prevention. Journal International Communication and Technology, 6, 224.
Razzaque, M. A., Milojevic-Jevric, M., Palade, A., & Clarke, S. (2015). Middleware for internet of things: A survey. IEEE Internet of Things Journal, 3(1), 70–95.
Kumar, J., Rajendran, B., Bindhumadhava, B. S., & Babu, N. S. C. (2017). XML wrapping attack mitigation using positional token. In 2017 International conference on public key infrastructure and its applications (PKIA) (pp. 36–42). IEEE.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Nagaraju, K., & Sridaran, R. (2012). A survey on security threats for cloud computing. International Journal of Engineering Research and Technology (IJERT), 1(7), 1–10.
Granjal, J., Monteiro, E., & Silva, J. S. (2014). Network-layer security for the internet of things using TinyOS and BLIP. International Journal of Communication Systems, 27(10), 1938–1963.
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 International conference on distributed computing in sensor systems and workshops (DCOSS) (pp. 1–8). IEEE.
Park, N., & Kang, N. (2016). Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors, 16(1), 20.
Ibrahim, M. H. (2016). Octopus: An edge-fog mutual authentication scheme. IJ Network Security, 18(6), 1089–1101.
Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. arXiv:1901.07309.
Shelby, Z., Hartke, K., & Bormann, C. (2014). The constrained application protocol (CoAP). RFC 7252. https://doi.org/10.17487/RFC7252
Ahmadi, P., Islam, K., Maco, T., & Katam, M. (2018). A survey on internet of things security issues and applications. In 2018 International conference on computational science and computational intelligence (CSCI) (pp. 925–934). IEEE.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.
Atzori, M. (2017). Blockchain-based architectures for the internet of things: A survey. SSRN 2846810.
Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS) (pp. 1392–1393). IEEE.
Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., & Ford, B. (2016). Managing identities using blockchains and CoSi. In 9th Workshop on hot topics in privacy enhancing technologies (HotPETs 2016) (No. POST\(_{-}\)TALK).
Gaurav, K., Goyal, P., Agrawal, V., & Rao, S. L. (2015). IoT transaction security. In Proceedings of the 5th international conference on the internet of things (IoT), Seoul, Korea (pp. 26–28).
Hashemi, S. H., Faghri, F., Rausch, P., & Campbell, R. H. (2016). World of empowered IoT users. In 2016 IEEE first international conference on internet-of-things design and implementation (IoTDI) (pp. 13–24). IEEE.
Bahga, A., & Madisetti, V. K. (2016). Blockchain platform for industrial internet of things. Journal of Software Engineering and Applications, 9(10), 533–546.
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292–2303.
Brody, P., & Pureswaran, V. (2014). Device democracy: Saving the future of the internet of things. IBM.
Antonopoulos, A. M. (2014). Mastering Bitcoin: Unlocking digital cryptocurrencies. O’Reilly Media, Inc.
Divya, M., & Biradar, N. B. (2018). IOTA-next generation block chain. International Journal of Engineering and Computer Science, 7(04), 23823–23826.
Shabandri, B., & Maheshwari, P. (2019). Enhancing IoT security and privacy using distributed ledgers with IOTA and the Tangle. In 2019 6th International conference on signal processing and integrated networks (SPIN) (pp. 1069–1075). IEEE.
Janečko, T., & Zelinka, I. (2018). Impact of security aspects at the IOTA protocol. In International conference on intelligent information technologies for industry (pp. 41–48). Springer.
Bartolomeu, P. C., Vieira, E., & Ferreira, J. (2018). IOTA feasibility and perspectives for enabling vehicular applications. In 2018 IEEE globecom workshops (GC Wkshps) (pp. 1–7). IEEE.
Quasim, M. T., Khan, M. A., Algarni, F., Alharthy, A., & Alshmrani, G. M. M. (2020). Blockchain Frameworks. In Decentralised internet of things (pp. 75–89). Springer.
Lamtzidis, O., & Gialelis, J. (2018). An IOTA based distributed sensor node system. In 2018 IEEE globecom workshops (GC Wkshps) (pp. 1–6). IEEE.
Sarfraz, U., Alam, M., Zeadally, S., & Khan, A. (2019). Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Computer Networks, 148, 361–372.
Popov, S. (2016). The tangle. cit. on, 131.
Florea, B. C. (2018). Blockchain and Internet of Things data provider for smart applications. In 2018 7th Mediterranean conference on embedded computing (MECO) (pp. 1–4). IEEE.
Chen, W. (2012). An IBE-based security scheme on internet of things. In 2012 IEEE 2nd international conference on cloud computing and intelligence systems (Vol. 3, pp. 1046–1049). IEEE.
Chatzigiannakis, I., Pyrgelis, A., Spirakis, P. G., & Stamatiou, Y. C. (2011). Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems (pp. 715–720). IEEE.
Koo, D., Shin, Y., Yun, J., & Hur, J. (2017). An online data-oriented authentication based on Merkle tree with improved reliability. In 2017 IEEE international conference on web services (ICWS) (pp. 840–843). IEEE.
Wang, J., Li, M., He, Y., Li, H., Xiao, K., & Wang, C. (2018). A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access, 6, 17545–17556.
Pohrmen, F. H., Das, R. K., & Saha, G. (2019). Blockchain-based security aspects in heterogeneous internet-of-things networks: A survey. Transactions on Emerging Telecommunications Technologies, 30(10), e3741.
Merkle, R. C. (1980). Protocols for public key cryptosystems. In 1980 IEEE symposium on security and privacy (pp. 122–122). IEEE.
Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016). Flow based security for IoT devices using an SDN gateway. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 157–163). IEEE.
Alrajeh, N. A., & Lloret, J. (2013). Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(10), 351047.
Pourghebleh, B., Wakil, K., & Navimipour, N. J. (2019). A comprehensive study on the trust management techniques in the internet of things. IEEE Internet of Things Journal, 6(6), 9326–9337.
Chen, R., Bao, F., & Guo, J. (2015). Trust-based service management for social internet of things systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 684–696.
Jayasinghe, U., Truong, N. B., Lee, G. M., & Um, T. W. (2016). Rpr: A trust computation model for social internet of things. In 2016 International IEEE conferences on ubiquitous intelligence and computing, advanced and trusted computing, scalable computing and communications, cloud and big data computing, internet of people, and smart world congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (pp. 930–937). IEEE.
Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In 2012 IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC) (pp. 18–23). IEEE.
Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for Internet of Things. China Communications, 11(2), 148–156.
Liu, Y. B., Gong, X. H., & Feng, Y. F. (2014). Trust system based on node behavior detection in internet of things. Journal on Communications, 5, 8–15.
Alrajeh, N. A., Khan, S., Mauri, J. L., & Loo, J. (2014). Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting. Ad Hoc Senser Wireless Networks, 22(1–2), 109–133.
Rae, J. S., Chowdhury, M. M., & Jochen, M. (2019). Internet of things device hardening using shodan. io and ShoVAT: A survey. In 2019 IEEE international conference on electro information technology (EIT) (pp. 379-385). IEEE.
Xiao, L., Li, Y., Han, G., Liu, G., & Zhuang, W. (2016). PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Transactions on Vehicular Technology, 65(12), 10037–10047.
Gwon, Y., Dastangoo, S., Fossa, C., & Kung, H. T. (2013). Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In 2013 IEEE conference on communications and network security (CNS) (pp. 28–36). IEEE.
Xiao, L., Li, Y., Huang, X., & Du, X. (2017). Cloud-based malware detection game for mobile devices with offloading. IEEE Transactions on Mobile Computing, 16(10), 2742–2750.
Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H. P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Communications Surveys and Tutorials, 16(4), 1996–2018.
Ozay, M., Esnaola, I., Vural, F. T. Y., Kulkarni, S. R., & Poor, H. V. (2015). Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Networks and Learning Systems, 27(8), 1773–1786.
Pavani, K., & Damodaram, A. (2013). Intrusion detection using MLP for MANETs.
Shi, C., Liu, J., Liu, H., & Chen, Y. (2017). Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing (pp. 1–10).
Branch, J. W., Giannella, C., Szymanski, B., Wolff, R., & Kargupta, H. (2013). In-network outlier detection in wireless sensor networks. Knowledge and Information Systems, 34(1), 23–54.
Hwang, T. S., Lee, T. J., & Lee, Y. J. (2007). A three-tier IDS via data mining approach. In Proceedings of the 3rd annual ACM workshop on Mining network data (pp. 1–6).
Cremers, C., Horvat, M., Hoyland, J., Scott, S., & van der Merwe, T. (2017). A comprehensive symbolic analysis of TLS 1.3. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1773–1788).
Rathore, S., Kwon, B. W., & Park, J. H. (2019). BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. Journal of Network and Computer Applications, 143, 167–177.
Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854–864.
Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys and Tutorials, 21(1), 686–728.
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for IoT and cloud in healthcare system. In Fog computing: Breakthroughs in research and practice (pp. 365–378). IGI global.
Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access, 5, 3302–3312.
Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A., & Kayssi, A. (2016). Identity-based authentication scheme for the Internet of Things. In 2016 IEEE Symposium on Computers and Communication (ISCC) (pp. 1109–1111). IEEE.
Kalkan, K., & Zeadally, S. (2017). Securing internet of things with software defined networking. IEEE Communications Magazine, 56(9), 186–192.
Di Mauro, A., Fafoutis, X., & Dragoni, N. (2015). Adaptive security in odmac for multihop energy harvesting wireless sensor networks. International Journal of Distributed Sensor Networks, 11(4), 760302.
Taddeo, A. V., Mura, M., & Ferrante, A. (2010). Qos and security in energy-harvesting wireless sensor networks. In 2010 International conference on security and cryptography (SECRYPT) (pp. 1–10). IEEE.
Hellaoui, H., Bouabdallah, A., & Koudil, M. (2016). Tas-iot: trust-based adaptive security in the iot. In 2016 IEEE 41st conference on local computer networks (LCN) (pp. 599–602). IEEE.
Wang, E. K., Wu, T. Y., Chen, C. M., Ye, Y., Zhang, Z., & Zou, F. (2015). Mdpas: Markov decision process based adaptive security for sensors in internet of things. In Genetic and evolutionary computing (pp. 389–397). Springer.
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), 2483–2495.
Zhang, X., Upton, O., Beebe, N. L., & Choo, K. K. R. (2020). IoT Botnet forensics: A comprehensive digital forensic case study on Mirai Botnet servers. Forensic Science International: Digital Investigation, 32, 300926.
Ghosh, S., Misoczki, R., & Sastry, M. R. (2019). Lightweight post-quantum-secure digital signature approach for IoT motes. IACR Cryptology, 2019, 122.
Shinder, D. L., & Cross, M. (2008). Scene of the cybercrime. Elsevier.
Liu, B., Chiang, J. T., Haas, J. J., & Hu, Y. C. (2010). Coward attacks in vehicular networks. ACM SIGMOBILE Mobile Computing and Communications Review, 14(3), 34–36.
Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials, 22 (3), 1646–1685.
Qu, F., Wu, Z., Wang, F. Y., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(6), 2985–2996.
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57).
Vytarani Mathane and P.V. Lakshmi, (2021). Predictive analysis of ransomware attacks using context-aware AI in IoT systems. International Journal of Advanced Computer Science and Applications (IJACSA), 12(4), 240–244.
Verma, M. E., Iannacone, M. D., Bridges, R. A., Hollifield, S. C., Kay, B., & Combs, F. L. (2020). ROAD: the real ORNL automotive dynamometer controller area network intrusion detection dataset (with a comprehensive CAN IDS dataset survey and guide). arXiv:2012.14600.
Barletta, V. S., Caivano, D., Nannavecchia, A., & Scalera, M. (2020). Intrusion detection for in-vehicle communication networks: An unsupervised kohonen som approach. Future Internet, 12(7), 119.
Alnasser, A., Sun, H., & Jiang, J. (2019). Cyber security challenges and solutions for V2X communications: A survey. Computer Networks.
Ali Alheeti, K. M., Gruebler, A., & McDonald-Maier, K. (2016). Intelligent intrusion detection of grey hole and rushing attacks in self-driving vehicular networks. Computers, 5(3), 16.
Ghasemi, M., Saadaat, M., & Ghollasi, O. (2019). Threats of social engineering attacks against security of Internet of Things (IoT). In Fundamental research in electrical engineering (pp. 957–968). Springer.
Koutras, D., Stergiopoulos, G., Dasaklis, T., Kotzanikolaou, P., Glynos, D., & Douligeris, C. (2020). Security in IoMT communications: A survey. Sensors, 20(17), 4828.
Tsiknas, K., Taketzis, D., Demertzis, K., & Skianis, C. (2021). Cyber threats to industrial IoT: A survey on attacks and countermeasures. IoT, 2(1), 163–188.
Lee, J., Lin, W., & Huang, Y. (2014). A lightweight authentication protocol for Internet of Things, 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1-2.
Author information
Authors and Affiliations
Contributions
Not applicable.
Corresponding author
Ethics declarations
Funding
Not applicable.
Availability of Data and Material
Not applicable.
Conflicts of interest
Not applicable.
Code Availability
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Swessi, D., Idoudi, H. A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures. Wireless Pers Commun 124, 1557–1592 (2022). https://doi.org/10.1007/s11277-021-09420-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09420-0