Comprehensive Analysis of Modern IoT Security Challenges and Solutions

Year : 2024 | Volume : 12 | Issue : 03 | Page : 34-39
    By

    Louay Al Nuaimy,

  • Mahammad Mastan,

  • G. Jai Arul Jose,

  1. Lecturer, Department of Computer Science and Management Information System, Oman College of Management and Technology, Halban, Sultanate of Oman
  2. Lecturer, Department of Computer Science and Management Information System, Oman College of Management and Technology, Halban, Sultanate of Oman
  3. Assistant Professor, Department of Computer Science, BMS Institute of Technology and Management, Bengaluru, Karnataka, India

Abstract

The Internet of Things (IoT) is rapidly transforming various industries by enhancing the human quality of life (QoL) through its wide-ranging applications. From healthcare to automotive, agriculture, education, and numerous other sectors, IoT has become essential for enabling smarter, more efficient systems. However, with its heterogeneous nature, IoT introduces a multitude of security challenges, as different IoT applications often function under varying frameworks and protocols. Consequently, addressing and studying IoT security concerns is crucial to ensure the safe and reliable deployment of IoT solutions. This paper explores the security challenges faced by IoT systems, identifying current vulnerabilities, and providing insight into the limitations and fundamental requirements for securing these systems. Moreover, it presents both existing and emerging solutions to these challenges, aimed at protecting IoT infrastructure from potential threats. By categorizing IoT security concerns according to the three-tiered architecture of IoT (perception, network, and application layers), this study offers a comprehensive approach to understanding the distinct security requirements at each level. The goal is to equip researchers and developers with the knowledge necessary to identify and implement the best practices for mitigating security risks in IoT environments. Through this structured overview, the study highlights how appropriate security measures can be adopted to ensure that IoT continues to evolve while maintaining the highest security standards.

Keywords: Connected object, IoT, architecture, security, security countermeasure, cloud computing

[This article belongs to Journal Of Network security ]

How to cite this article:
Louay Al Nuaimy, Mahammad Mastan, G. Jai Arul Jose. Comprehensive Analysis of Modern IoT Security Challenges and Solutions. Journal Of Network security. 2024; 12(03):34-39.
How to cite this URL:
Louay Al Nuaimy, Mahammad Mastan, G. Jai Arul Jose. Comprehensive Analysis of Modern IoT Security Challenges and Solutions. Journal Of Network security. 2024; 12(03):34-39. Available from: https://journals.stmjournals.com/jons/article=2024/view=180525



References

  1. Weber RH. Internet of Things – New security and privacy challenges. Comput Law Secur Rev. 2010;26(1):23-30. DOI: 10.1016/j.clsr.2009.11.008.
  2. Haddad Pajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H. A survey on Internet of Things security: Requirements, challenges, and solutions. Internet Things. 2021;14:100129. DOI: 10.1016/j.iot.2019.100129.
  3. Saleh I. Les enjeux et les défis de l’internet des Objets (IdO). Internet des Objets. 2017;17:5. DOI: 10.21494/ISTE.OP.2017.0133.
  4. Weber RH, Studer E. Cybersecurity in the Internet of Things: Legal aspects. Comput Law Secur Rev. 2016;32(5):715-28. DOI: 10.1016/j.clsr.2016.07.002.
  5. Singh D, Tripathi G, Jara AJ. A survey of Internet-of-Things: Future vision, architecture, challenges and services. 2014 IEEE World Forum on Internet of Things (WF-IoT). 2014. p. 287-92. DOI: 10.1109/WF-IoT.2014.6803174.
  6. Bhabad MA, Bagade ST. Internet of things: Architecture, security issues and countermeasures. Int J Comput Appl. 2015;125(14):1-4.
  7. Xiaohui X. Study on security problems and key technologies of the Internet of things. 2013 International Conference on Computational and Information Sciences. 2013. p. 407–10. DOI: 10.1109/ICCIS.2013.114.
  8. Roman R, Lopez J, Mambo M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener Comput Syst. 2018;78:680-98. DOI: 10.1016/j.future.2016.
    009.
  9. Atzori L, Iera A, Morabito G. The internet of things: A survey. Comput Netw. 2010;54(15):2787-805. DOI: 10.1016/j.comnet.2010.05.010.
  10. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead. Comput Netw. 2015;76:146–64. DOI: 10.1016/j.comnet.2014.11.008.
  11. Nie L, Jiang D, Guo L. A convex optimization-based traffic matrix estimation approach in IP-over-WDM backbone networks. J Netw Comput Appl. 2015;50:32–8. DOI: 10.1016/j.jnca.2014.12.001.
  12. Lee I, Lee K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus Horiz. 2015;58(4):431–40. DOI: 10.1016/j.bushor.2015.03.008.
  13. Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener Comput Syst. 2013;29(7):1645–60. DOI: 10.1016/j.
    2013.01.010.
  14. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D. Security of the Internet of Things: Perspectives and challenges. Wirel Netw. 2014;20:2481–501. DOI: 10.1007/s11276-014-0761-7.
  15. Farooq MS, Riaz S, Abid A, Abid K, Naeem MA. A survey on the role of IoT in agriculture for the implementation of smart farming. IEEE Access. 2019;7:156237-71. DOI: 10.1109/ACCESS.2019.
  16. Othman MF, Shazali K. Wireless sensor network applications: A study in environment monitoring system. Procedia Eng. 2012;41:1204-10. DOI: 10.1016/j.proeng.2012.07.302.
  17. Wang Z, Huang Y, Ankrah V, Dai J. Greening the knowledge-based economies: Harnessing natural resources and innovation in information and communication technologies for green growth. Resour Policy. 2023;86:104181. DOI: 10.1016/j.resourpol.2023.104181.
  18. Heer T, Garcia-Morchon O, Hummen R, Keoh SL, Kumar SS, Wehrle K. Security challenges in the IP-based Internet of things. Wirel Pers Commun. 2011;61(3):527-42. DOI: 10.1007/s11277-011-0385-5.
  19. Babar S, Stango A, Prasad N, Sen J, Prasad R. Proposed embedded security framework for Internet of Things (IoT). 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). IEEE; 2011. p. 1–5. DOI: 10.1109/WIRELESSVITAE.2011.5940923.
  20. Chasaki D, Mansour C. Security challenges in the Internet of things. Int J Space-Based Situated Comput. 2015;5(3):141-9. DOI: 10.1504/IJSSC.2015.070945.

Regular Issue Subscription Original Research
Volume 12
Issue 03
Received 11/09/2024
Accepted 30/09/2024
Published 29/10/2024


My IP

PlumX Metrics