skip to main content
10.1145/3485557.3485582acmotherconferencesArticle/Chapter ViewAbstractPublication PagesarabwicConference Proceedingsconference-collections
research-article

Enabling Security as a Service for IoT Emerging Technologies: A Survey

Published: 29 November 2021 Publication History

Abstract

Internet of things (IoT) is one of the long-run technologies that spread widely in recent years. IoT aims to connect any object with the internet depending on a special architecture made to match with the environment and the application designed for. The architecture contains sensing elements to collect data, computing elements to process data and make decisions, actuators to apply the process, in addition to the storage part. The prevalence of smart devices and easy access to the Internet increases the widespread use of IoT technology and the different applications of it require providing a high-quality service. One of the challenges facing the IoT applications is to provide security as a service. Security as a service for IoT can be provided by integrating one or more of the emerging technologies with the Internet of things applications to obtain high security according to the application. Therefore, in this study we presented a review of the recent findings and solutions of researchers in the field of developing security for IoT applications by enabling one or more of the emerging technologies.

References

[1]
Karmakar, K. K., Varadharajan, V., Nepal, S., & Tupakula, U. (2021). SDN-Enabled Secure IoT Architecture. IEEE Internet of Things Journal, 8(8), 6549–6564.
[2]
Zhu, Q., Wang, R., Chen, Q., Liu, Y., & Qin, W. (2010). IOT Gateway: BridgingWireless Sensor Networks into Internet of Things. 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. https://doi.org/10.1109/euc.2010.58
[3]
Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A Survey. IEEE Internet of Things Journal, 6(5), 8076–8094. https://doi.org/10.1109/jiot.2019.2920987
[4]
Shanzhi Chen, Hui Xu, Dake Liu, Bo Hu, & Hucheng Wang. (2014). A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective. IEEE Internet of Things Journal, 1(4), 349–359. https://doi.org/10.1109/jiot.2014.2337336
[5]
Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity Security in the Internet of Things. Computer, 46(4), 46–53. https://doi.org/10.1109/mc.2013.74
[6]
Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, 1–25. https://doi.org/10.1155/2017/9324035
[7]
Burhan, M., Rehman, R., Khan, B., & Kim, B. S. (2018). IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors, 18(9), 2796. https://doi.org/10.3390/s18092796
[8]
Li, J., Zhao, Z., Li, R., & Zhang, H. (2019). AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks. IEEE Internet of Things Journal, 6(2), 2093–2102. https://doi.org/10.1109/jiot.2018.2883344
[9]
Enache, A. C., & Sgarciu, V. (2015). A feature selection approach implemented with the Binary Bat Algorithm applied for intrusion detection. 2015 38th International Conference on Telecommunications and Signal Processing (TSP). Published. https://doi.org/10.1109/tsp.2015.7296215
[10]
Jiahai Wang, Jianjun Liao, Ying Zhou, & Yiqiao Cai. (2014). Differential Evolution Enhanced With Multiobjective Sorting-Based Mutation Operators. IEEE Transactions on Cybernetics, 44(12), 2792–2805. https://doi.org/10.1109/tcyb.2014.2316552
[11]
Saxena, H., & Richariya, V. (2014). Intrusion Detection in KDD99 Dataset using SVM-PSO and Feature Reduction with Information Gain. International Journal of Computer Applications, 98(6), 25–29. https://doi.org/10.5120/17188-7369
[12]
Mohammadali, A., Sayad Haghighi, M., Tadayon, M. H., & Mohammadi-Nodooshan, A. (2018). A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid. IEEE Transactions on Smart Grid, 9(4), 2834–2842. https://doi.org/10.1109/tsg.2016.2620939
[13]
D. Hardt (Oct 2012). The OAuth 2.0 authorization framework" [online] Available: https://www.hjp.at/doc/rfc/rfc6749.html.
[14]
Dawoud, A., Shahristani, S., & Raun, C. (2018). Deep learning and software-defined networks: Towards secure IoT architecture. Internet of Things, 3–4, 82–89. https://doi.org/10.1016/j.iot.2018.09.003
[15]
Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768. https://doi.org/10.1016/j.future.2017.08.043
[16]
Tiburski, R. T., Moratelli, C. R., Johann, S. F., Neves, M. V., Matos, E. D., Amaral, L. A., & Hessel, F. (2019). Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices. IEEE Communications Magazine, 57(2), 67–73. https://doi.org/10.1109/mcom.2018.1701047
[17]
Ficco, M. (2019). Internet-of-Things and fog-computing as enablers of new security and privacy threats. Internet of Things, 8, 100113. https://doi.org/10.1016/j.iot.2019.100113
[18]
HaddadPajouh, H., Khayami, R., Dehghantanha, A., Choo, K. K. R., & Parizi, R. M. (2020). AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Computing and Applications, 32(20), 16119–16133. https://doi.org/10.1007/s00521-020-04772-3
[19]
Bormann, C., Castellani, A. P., & Shelby, Z. (2012). CoAP: An Application Protocol for Billions of Tiny Internet Nodes. IEEE Internet Computing, 16(2), 62–67. https://doi.org/10.1109/mic.2012.29
[20]
Arcenegui, J., Arjona, R., Román, R., & Baturone, I. (2021). Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs. Sensors, 21(9), 3119. https://doi.org/10.3390/s21093119
[21]
Zarca, A. M., Bernabe, J. B., Skarmeta, A., & Alcaraz Calero, J. M. (2020). Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV- Enabled IoT Networks. IEEE Journal on Selected Areas in Communications, 38(6), 1262–1277. https://doi.org/10.1109/jsac.2020.2986621
[22]
Molina Zarca, A., Bernabe, J. B., Trapero, R., Rivera, D., Villalobos, J., Skarmeta, A., Bianchi, S., Zafeiropoulos, A., & Gouvas, P. (2019). Security Management Architecture for NFV/SDN-Aware IoT Systems. IEEE Internet of Things Journal, 6(5), 8005–8020. https://doi.org/10.1109/jiot.2019.2904123
[23]
Levine, J., Grizzard, J., & Owen, H. (2004). Using honeynets to protect large enterprise networks. IEEE Security and Privacy Magazine, 2(6), 73–75. https://doi.org/10.1109/msp.2004.115
[24]
Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119. https://doi.org/10.1109/mcom.2013.6461195

Cited By

View all
  • (2024)Security Dynamics of Blockchain-Enabled SDN Systems: A Taxonomic Approach2024 9th International Conference on Computer Science and Engineering (UBMK)10.1109/UBMK63289.2024.10773558(1-6)Online publication date: 26-Oct-2024
  • (2023)Enhancing Network Security in SDNIoT Environments Through CNN-Based Attack Detection2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)10.1109/ICSSAS57918.2023.10331737(1388-1394)Online publication date: 18-Oct-2023
  • (2023)Safeguarding the IoT: Taxonomy, security solutions, and future research opportunitiesSECURITY AND PRIVACY10.1002/spy2.3547:2Online publication date: 20-Nov-2023

Index Terms

  1. Enabling Security as a Service for IoT Emerging Technologies: A Survey
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ArabWIC 2021: The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in Research
      August 2021
      145 pages
      ISBN:9781450384186
      DOI:10.1145/3485557
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 November 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ArabWIC 2021

      Acceptance Rates

      Overall Acceptance Rate 20 of 36 submissions, 56%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Security Dynamics of Blockchain-Enabled SDN Systems: A Taxonomic Approach2024 9th International Conference on Computer Science and Engineering (UBMK)10.1109/UBMK63289.2024.10773558(1-6)Online publication date: 26-Oct-2024
      • (2023)Enhancing Network Security in SDNIoT Environments Through CNN-Based Attack Detection2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)10.1109/ICSSAS57918.2023.10331737(1388-1394)Online publication date: 18-Oct-2023
      • (2023)Safeguarding the IoT: Taxonomy, security solutions, and future research opportunitiesSECURITY AND PRIVACY10.1002/spy2.3547:2Online publication date: 20-Nov-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media