International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.12(11)(2021)

  • Internet of Things Major Security Issues: Challenges and Defense Strategies

    Adel AlZahrani (King Abdulaziz Medical City NGHA, Jeddah, SAUDI ARABIA),
    Abdullah Safhi (King Abdulaziz University, Jeddah, SAUDI ARABIA),
    Mohammed Al-Hebbi (King Abdulaziz Medical City NGHA, Jeddah, SAUDI ARABIA).

    Disciplinary: Information Technology.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2021.229

    Keywords: Internet-of-things; IoT security risk; Edge layer; IoT risk solutions; Application layer; Strategy; MIoT; Security challenges; Physical layer; Perception layer; Big data analytics.

    Abstract
    The Internet of Things (IoT) has enabled significant advancements in a wide variety of scientific fields, and as a result, it has emerged as a highly attractive subject in both academia and business. The IoT aims to achieve universal Internet connectivity by transforming everyday objects into connected gadgets. Regardless of whether it results in beneficial economic and social outcomes, protecting the security and privacy of objects and users remains a critical issue that must be addressed. Addressing and evaluating IoT security risks is critical, as IoT application operating techniques vary according to the variety of IoT environments. Thus, by discussing IoT security concerns alongside available and potential solutions, developers and businesses can identify relevant and timely responses to specific threats, resulting in the best possible IoT-based services. This article discusses the challenges inherent in implementing IoT security and some critical solutions for resolving these issues. Ten papers were extracted and analyzed to contribute to the corpus of literature by focusing on several critical challenges in the internet-of-things sector and shedding light on how these challenges affect a variety of domains, including healthcare, education, and business intelligence. The most frequently mentioned challenges were those related to privacy, as well as the application, network, perception, and edge layers. This paper addressed these issues by incorporating previously discovered solutions. There has been discussion of the implications for both researchers and practitioners.

    Paper ID: 12A11S

    Cite this article:

    AlZahrani, A., Safhi, A., Al-Hebbi, M. (2021). Internet of Things Major Security Issues: Challenges and Defense Strategies. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 12(11), 12A11S, 1-13. http://doi.org/10.14456/ITJEMAST.2021.229



References

  1. Anderson, C. M., & Long, E. S. (2002). Use of a structured descriptive assessment methodology to identify variables affecting problem behavior. Journal of Applied Behavior Analysis, 35(2), 137-154.
  2. Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of Things: Security vulnerabilities and challenges. 2015 IEEE Symposium on Computers and Communication (ISCC), 180-187. DOI: 10.1109/ISCC.2015.7405513
  3. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544-546. DOI: 10.1016/j.future.2017.07.060
  4. Dai, H.-N., Wang, H., Xu, G., Wan, J., & Imran, M. (2020). Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies. Enterprise Information Systems, 14(9-10), 1279-1303.
  5. De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side. Journal of Marketing Management, 33(1-2), 145-158.
  6. Grammatikis, R. P. I., Sarigiannidis, P. G., & Moscholios, I. D. (2019). Securing the Internet of Things: Challenges, threats and solutions. Internet of Things, 5, 41-70. DOI: 10.1016/j.iot.2018.11.003
  7. Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312. DOI: 10.1109/COMST.2015.2388550
  8. Gupta, K., & Shukla, S. (2016). Internet of Things: Security challenges for next generation networks. 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 315-318. DOI: 10.1109/ICICCS.2016.7542301
  9. HaddadPajouh, H., & Parizi, R. (2019). A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things, 14, 100129. DOI: 10.1016/j.iot.2019.100129
  10. Kumar, S. A., Vealey, T., & Srivastava, H. (2016). Security in Internet of Things: Challenges, Solutions and Future Directions. 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772-5781. DOI: 10.1109/HICSS.2016.714
  11. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440. DOI: 10.1016/j.bushor.2015.03.008
  12. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5), 1125-1142. DOI: 10.1109/JIOT.2017.2683200
  13. Mosenia, A., & Jha, N. K. (2017). A Comprehensive Study of Security of Internet-of-Things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602. DOI: 10.1109/TETC.2016.2606384
  14. Ouaddah, A., Mousannif, H., Abou Elkalam, A., & Ait Ouahman, A. (2017). Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, 237-262. DOI: 10.1016/j.comnet.2016.11.007
  15. Sain, M., Kang, Y. J., & Lee, H. J. (2017). Survey on security in Internet of Things: State of the art and challenges. 2017 19th International Conference on Advanced Communication Technology (ICACT), 699-704. DOI: 10.23919/ICACT.2017.7890183
  16. Saunders, M., Lewis, P., & Thornhill, A. (2003). Research methods for business students. Essex: Prentice Hall: Financial Times.
  17. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137. DOI: 10.1016/j.dcan.2017.04.003
  18. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. DOI: 10.1016/j.comnet.2014.11.008
  19. Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund, M. (2018). Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Transactions on Industrial Informatics, 14(11), 4724-4734. DOI: 10.1109/TII.2018.2852491
  20. Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of Things: A Review. 2012 International Conference on Computer Science and Electronics Engineering, 3, 648-651. DOI: 10.1109/ICCSEE.2012.373


Other issues:
Vol.12(12)(2021)
Vol.12(11)(2021)
Vol.12(10)(2021)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (no space between). (please see all detail from Instructions for Authors)


Publication and peer-reviewed process:
After the peer-review process (4-10 weeks), articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.