Recent security trends in internet of things: A comprehensive survey

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous

Research output: Contribution to journalReview articlepeer-review

12 Citations (Scopus)

Abstract

The Internet of Things (IoT) aims to transform everyday physical objects into an interconnected ecosystem with digital data accessible anywhere and anytime. 'Things' in IoT are embedded with sensing, processing, and actuating capabilities and cooperate in providing smart and innovative services autonomously. The rapid spread of IoT services arises different security vulnerabilities that need to be carefully addressed. Several emerging and promising technologies and techniques are introduced to improve the security of IoT. This paper aims to provide an up-to-date vision of the current research topics related to IoT security. Initially, we introduce common elements and protocols of IoT to demystify the origins of threats in IoT. Then, we propose a taxonomy of IoT attacks and analyze the security vulnerabilities of IoT at different layers. Subsequently, we provide a comparison of recent security schemes based on emerging solutions including fog computing, edge computing, software-defined networking (SDN), blockchain, lightweight cryptography, homomorphic and searchable encryption, and machine learning. Finally, security challenges are discussed and future directions are highlighted for future interested researchers.

Original languageEnglish
Article number9509539
Pages (from-to)113292-113314
Number of pages23
JournalIEEE Access
Volume9
DOIs
Publication statusPublished - 2021
Externally publishedYes

Keywords

  • Blockchain
  • IoT
  • SDN
  • edge computing
  • fog computing
  • lightweight cryptography
  • machine learning

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Recent security trends in internet of things: A comprehensive survey'. Together they form a unique fingerprint.

Cite this