Internet of Things: Security and Solutions Survey
Abstract
:1. Introduction
1.1. Paper Organization
1.2. Motivations
1.3. Internet of Things
1.4. Internet of Everything
- People, in a system, are a critical element of the IoE environment. With the introduction of IoE, people share their personal insights through innumerable new ways of communication such as social networks, data-collecting smart sensors, actuators, smartwatches, etc. These data are being transmitted to the servers for analyzing and providing relevant information according to their personal, system, industry, or business demands. The information assists the people or system in quickly resolving open issues or reach to decisions.
- Data are transferred as a traditional IoT network. Data, complete or partial, collected by devices could either be sent directly or after initial transformation in the edge layer. The raw data captured or generated by the device has no importance. Nevertheless when these pieces of data are transformed, summarized, classified, and analyzed by the device itself or by the cloud server at the edge layer, it becomes priceless content that can monitor and control numerous systems, make accurate and faster decisions, and entitle smart solutions.
- Process based on various systems such as artificial intelligence, deep learning, social networks, computer vision, or other technologies helps to deliver the proper information to the designated people/device/place at the expected time. Through this process, information will be extracted from data, and the data communication will be controlled through the network. The purpose of processes is to get the optimum outcome for further processing or decision making.
- Things encounter the definition of IoT. Different kinds of sensing elements are embedded with physical items that serve the purpose of the data collection. Different devices must have communication capabilities, wireless or wired, for transmitting generated and processed data to the right destination across the system.
1.5. Data Privacy and Security
2. Related Work
- Overview and elements of both IoT and IoE networks. The differences between these are discussed.
- Limitations and Vulnerabilities of IoT devices and network. The taxonomy of different layers is provided in detail.
- Countermeasures of each kind of attack are provided with reference.
- Available security measures and their application in the sector of IoT are analyzed.
- Open issues of IoT security systems and future directions are also discussed.
3. IoT Applications
3.1. Smart City
3.2. Internet of Medical Things (IoMT)
3.3. Smart Grid
3.4. Internet of Vehicles (IoV)
4. Devices’ Vulnerabilities and Requirements
4.1. Security Constraints
4.2. IoT Attack Surfaces
4.3. IoT Vulnerabilities
- Limited computing capabilities and hardware limitations: These devices are designed for particular applications that require only limited processing capabilities, leaving minimal area for security and data protection to be integrated.
- Heterogeneous transmission technology: These devices communicate with different kinds of devices and frequently use various communication technologies, which make it difficult to establish uniform protection measures and protocols.
- Components of the device are vulnerable: Millions of smart devices can be harmed by insecure or outdated fundamental elements.
- Users lacking security awareness: Due to a lack of user security knowledge, smart devices may be exposed to risk zones and attack possibilities. Many IoT devices allow users to integrate third-party apps, which could also drive the device into a danger zone.
- Weak Physical Security: Unlike data centers of internet services, not only just users, but also others with heinous intents, have physical access to a major share of IoT components.
4.4. IoT Security Requirements
4.5. IoT Attacks
4.5.1. Spoofing Attacks
- IP Address Spoofing Attacks: While a node communicates, it exchanges network data packets, each of which contains several headers for routing and transmission continuity. The ’Source IP Address’ header, for example, shows the packet’s sender’s IP address. In an IP address spoofing attack, an attacker falsifies the content of the origin IP header generally with random numbers in order to disguise itself. Most DDoS malware kits and attack scripts include IP spoofing as a standard feature. In two processes, IP spoofing attacks can make use of network traffic to flood targets. In one process, multiple spoofed addresses can be used to flood a selected target. This approach operates by sending more data to a target than it can manage. In another method, the victim’s IP address is spoofed, and packets are being sent from that address to numerous receivers on the network. When other nodes receive the packet, those will send a response to the target’s address, and the target will be flooded. Lack of controls against Denial of Service: Services can be targeted in such a way that they deny service to the entire network or device itself. The surface attack area is device network services for this case [68].
- ARP Spoofing Attacks: ARP (Address Resolution Protocol) is a protocol that translates IP to MAC and vice versa, allowing network communications to reach a particular destination on the network. ARP Spoofing Attacks, also called as ARP Poisoning, involve an attacker sending forged ARP answers over a neighborhood region conducive to getting the IP address of a legitimate member of the network, which will be used to link with the attacker’s MAC address. After connecting the attacker’s MAC address to a valid IP address, the intruder will start to receive any messages destined for that IP address. An attacker can use this technique to intercept, manipulate, or even interrupt data in transit, allowing them to carry out other types of exploits like denial-of-service, eavesdropping, session hijacking, and man-in-the-middle attacks. Only local area networks that use the Address Resolution Protocol are vulnerable to ARP spoofing attacks [69].
- DNS Server Spoofing Attacks: DNS stands for Domain Name System, and it is a system that converts website addresses, email addresses, and other human-readable domain names into IP addresses. In this attack, the attacker introduces corruption into the DNS resolver’s cache, which is utilized to redirect a given domain name to a different address, in this attack. The attacker’s server will be at the new IP address, including malware-infected files. Spoofing DNS servers is a common way for computer worms and viruses to spread [70,71].
4.5.2. Attacks Based on Access-Level
- Active Attacks: In this case, the adversary has the intention to cause disturbance among legitimate nodes by impersonating or manipulating the routing information.
- Passive Attacks: In most cases, the intruder eavesdrops on the lawful transmitter’s and receiver’s communication in order to obtain the communicated data.
4.5.3. Attacks Based on Transmitting Data
- Transmitting via Light Sensors: One of the methods to compromise signals and send malevolent signals is light sensors which makes it simple to transmit data packets by turning on and off a light source. The difference of light intensity will act as a source of the device’s data flow. An adversary can activate malware by delivering a trigger message by regulating light intensity, i.e., adjusting the voltage of a light source.
- Transmitting via Magnetic Sensors: The functionality of a magnetic sensor depends on the magnetic fields of the surroundings of the device. It will be affected if there is a change in the magnetic fields of the device’s peripherals. To send data using magnetic sensor, permission from users is not required and can be silently run in the background [76]. An attacker can make forged data of the magnetic sensor by shifting the magnetic field of the atmosphere of the device. This action can ultimately trigger messages of malware. Triggering signals encoded by an electromagnet can be communicated to an IoT device, and this message will cause certain variations in the device’s magnetic sensed data. The triggering message can be derived from this electromagnetic signal by calculating differences.
- Transmitting via Audio Sensors: Malware in IoT devices can also be activated using audio sensors. Microphones in modern IoT devices may identify audio signals with a frequency relatively lower than the audible frequency range, and triggering messages can be sent using this type of audio signal to get over the device’s security measures.
4.5.4. Attacks Based on Device Property
- High-end device class attacks: In high-end device class attacks, powerful devices with high processing capability launch attacks on the IoT network. Between comprehensive devices and the network, the internet protocol is utilized. The attacker uses the high processing power of the CPU of the powerful devices, e.g., laptop, computers, to connect with the IoT network to launch an attack from anywhere and anytime [78,79].
- Low-end device class attacks: It can be identified from the name of the attack that this attack involves low power and energy consumption devices to introduce an attack. The devices which are used in this attack can make a connection between the system and outside using radio links. A smartwatch, for instance, can be coupled to intelligent devices such as a smart TV, smartphone, smart refrigerator, smart temperature controller, and smart surveillance camera in a smart home system. It can also control the functionalities and configurations of these devices. Nevertheless, the smart home system can be under attack by low-power IoT devices like smartwatches [80,81].
4.5.5. Attacks Based on Adversary Location
- External attacks: Most external attacks happen with the aim of stealing the private data of users using malware such as worms, Trojan horse viruses, phishing, and the like. A hacker can gain control of the IoT device that is located anywhere on the IoT network. Without prior knowledge of the architecture of the network, the adversary tries to get access using a trial and error process. He will try until his attempt is successful.
- Internal attacks: An insider threat is someone who is a legitimate user of a network, system, or can access data and deliberately misuses it, or whose access leads to abuse. In this example, the attacker gains access to a component within the security IoT border and runs malicious malware against IoT devices. Compromised actors, unintentional actors, emotional attackers, and technology perception actors are the four categories of internal attacks.
4.5.6. Attacks Based on Attacks Strategy
- Physical attacks: To carry out this method, the attacker must have direct access to the IoT network’s infrastructure. The adversary can disturb a partial or full IoT network by changing the instruction or structure of the system.
- Logical attacks: Contrary to physical attacks, in logical attacks no physical access is required. Attackers do not cause any damage to the device physically; instead of this, the attacker makes the communication channel dysfunctional.
4.5.7. Attacks Based on Information Damage Level
- Interruption: An interruption attack is an attack that creates an obstruction of any kind during the communication process between one or more systems. As a result, resource exhaustion is one of the outcomes of an interruption and the systems, which are under attack by illegitimate users, become unusable which results in the system being in shutdown mode.
- Eavesdropping: When a hacker uses unprotected or insecure data transmission to steal data shared or communicated through electronic devices, the attack is known as an eavesdropping attack. A sniffing or snooping attack is another name for it. In this attack, there are no anomalies in the network communications themselves, which makes the probability of this attack higher. IoT systems’ confidentiality breaches when there is an eavesdropping attack.
- Alteration: As the name suggests, in this attack the message which is sent by the sender is altered and transmitted to the destination by an unauthorized user. The integrity of the message and security requirements of the system is threatened by this type of attack. The receiver receives the exact message that an attacker is wanted to send. It will result in the poor performance of the network. To deceive the communication protocol, the adversary does it in an undisciplined manner.
- Fabrication: In this type of attack, an intimation data is inserted into the network by an unauthorized user as if it is a valid user who threatens the authentication of the IoT system. As a result, the message’s confidentiality, authenticity, and integrity are compromised.
- Message Replay: A replay attack (also known as a playback attack) is a type of network assault in which genuine data is captured, and the original message is resent or delayed in order to breach the target IoT devices. The IoT recipient device will be confused by a replayed message, which could harm the IoT system. This is one of the lower-tier variations of man-in-the-middle attacks.
- Man-in-the-middle: As the term implies, an attacker stands between the transmitter and the recipient; the attacker relay and possibly alter the communication between two parties, and the attacker collects information from the communication channel. Two parties feel they are conversing directly with each other in this situation.
4.5.8. Host-Based Attacks
- Software-based attacks: Software can be compromised by an intruder to push the IoT device into a vulnerable state. An attacker can drive the device into an exhaustion state or resource buffer overflows by host-based attacks. For example, by compromising the sleeping mode, attacker can cause a sudden shutdown of the device due to low battery which breaches the interoperability of the system.
- Hardware-based attack: In this type of host-based malfunction, an intruder compromises hardware by cloning/tampering. Attackers steal actual driver, theft data by connecting to a device and injecting malicious code. For example, using an illegitimate charger which transfers malicious code along with charging, a smartphone can be exploited.
- User-based attacks: Sometimes, a user intentionally or unintentionally shares confidential data such as credentials (e.g., password, security, etc.) keys related to security. For instance, a user writes down a password in a file that is accessed by an unauthorized user who will be able to access the IoT devices [82].
4.5.9. Protocol Based Attacks
- Deviation from protocol: The attacker impersonates a legitimate user and injects malicious code into the IoT system, causing it to deviate from the protocol. Application and networking protocols are the protocols where attacks happen to make a deviation from the protocol.
- Protocol disruption: The availability is one of the security characteristics in the context of IoT security. It is important to have functional security to make a reliable IoT system. However, attackers can disrupt IoT networks from both inside and outside the network, putting the network’s availability in jeopardy.
4.6. Classification of IoT Security Attacks on Different Layers of IoT Networks
4.6.1. Physical Attacks
- Node Jamming in WSNs: A node jamming attack in WSNs is carried out by malicious nodes in the network, which interfere or disrupt or jam the radio signals used by sending useless information on the frequency band used [83]. An attacker can expel the service of the IoT device if the attacker can manage to jam the key sensor. In the case of a jamming attack, the statistical features (for instance, mean and variance) of a packet flow will fluctuate temporarily. Depending on its strength, a jamming source may be able to take down the entire system or only a small piece of it. This blocking can be temporary, periodic, or permanent.
- Physical Damage: A physical damage attack is an attack that results in physical damage to the targeted infrastructure. The attacker can gain access to the devices by physically damaging entities of the IoT network to serve his interest. This type of attack can be avoided if the protection of the zone where IoT devices are located is strong [84].
- Node Tampering: A node tampering attack is an attack where an adversary damages a sensor node. The entire sensor node can be replaced, or a part of the hardware can be compromised. A compromised node can be created by altering or replacing a node, and the attacker can control that node. By getting access, an attacker can alter sensitive information, for example, shared cryptographic keys/credentials (if any) or routing tables or other data, as well as disrupt the functionality of higher communication levels [20,39,79,85,86].
- Social Engineering: In social engineering attacks, malicious activities are accomplished through human interactions [87]. Social engineering is the psychological manipulation to trick users of an IoT system into performing certain actions or giving away confidential information that would serve their goals. Social engineering attacks may involve one or more steps. An attacker begins by gathering the background data needed to carry out the attack, such as potential avenues of entry and inadequate security procedures. The attacker then goes about gaining the victim’s trust, providing encouragement for additional behaviors that breach security principles, and obtaining the necessary information.
- Malicious Node Injection: In this attack [84], the attacker physically deploys a malicious node in the IoT network, which gathers information for the attacker or modifies the communication data to pass wrong information to the other nodes. Hence the attacker controls the transmission and reception of data flow and, finally the operation of the nodes.
- Sleep Deprivation Attack: The IoT devices are programmed to follow a sleep routine to remain in a low power mode for as long as would be possible without adversely affecting the node’s applications; hence it extends its battery life. The computing devices, such as a sensor node, which are powered by a battery, are susceptible to sleep deprivation attacks [88]. The attacker interacts with the node in such a way that appears to be permitted; however, the intention is to keep the victim node active which will lead to higher power consumption and become out of order [88].
- Malicious Code Injection/Forgery Attacks: The attacker attacks the device physically and injects malicious code to compromise the system and gain access. This can be done by inserting a USB with a malevolent program onto the node or by inserting communication links using methods such as (1) inserting malicious codes/data packets which seem legitimate; (2) modifying codes/data packets after capturing; (3) replacing the previously exchanged messages between nodes. The purpose of a malicious code injection attack could be various, e.g., to steal data, get control of the whole or partial system, and propagate worms [86,89,90].
- RF Interference on RFIDs: RFID is an auto-identification technology where communication is done using radio frequency (RF) with an identification code (ID). In this attack, the signal is compromised by creating and sending noise signals over the RF signal, which is being used for the communication of RFIDs. The noise will cause disturbance for RFID signals [91,92].
- Tag Cloning: In a clone attack, the attacker wants to have a tag that will have the same characteristics as the original tag and eventually can replace it [93]. In this attack, an attacker will be able to copy information of an RFID electronic tag or smart card to a cloned tag through reverse engineering or directly from its deployment environment. Sniffing, eavesdropping, and other technologies are used in clone attacks to get all of the data from the original tag, including encoding and customer information. It can copy all of the data to an RFID tag that can write to the entire region and replicate the tag [94,95].
- Eavesdropping: An eavesdropping attack, also known as a sniffing or snooping attack, is information thievery as it is transmitted using wireless communication. To eavesdrop, an attacker can use an antenna to get communicated data in an RFID system [96]. To be successful, an attacker finds a weak connection so that he can exploit it to reroute network traffic [97].
- Object replication: As IoT devices are not monitored physically in remote places, an attacker, in this type of attack, can physically insert a new device/object into the network. For instance, a malevolent object could be added by replicating the object’s identity. As a result, such an attack could result in significant network performance degradation. Aside from degrading performance, the malicious object can simply corrupt or misdirect received packets, giving the attacker access to sensitive information and extracting secret keys [85].
- Hardware Trojan: A hardware trojan attack has been identified as the prime security issue in an integrated circuit in many different forms of research. Like other attacks, the aim of the attacker is to gain access and collect confidential information and firmware. In this attack, the adversary maliciously modifies the integrated circuit. The hardware trojan attacks are planned during the design phase and remain inactive until the designer sends it a trigger or an event [20].
4.6.2. Encryption Attack
- Man in the Middle Attack: The man-in-the-middle attack is a cyberattack where the attacker takes a position between two users on the communication line and shares keys with both users. The adversary can intercept the signal that both users are sending to each other and can encrypt or decrypt data with the keys that he shares with both of them. An attacker can also alter the communications between two parties without their knowledge who think that they are sending data to each other [120].
- Side-Channel Attacks: Physical characteristics of IoT devices (e.g., power consumption, execution time, electromagnetic leaks, system fault, etc.) can reveal sensitive information. During the execution time of IoT devices, the intruder performs different tests to extract confidential information. Sometimes it is required to have technical knowledge of the inner working principle of the system, which will be exploited. In public-crypto systems such as RSA, extracting information from the device’s behavior is common [23]. RSA performs encryption and decryption of messages using private and public keys based on modular operations and large exponential values. The simple multiplication method is applied to modular operations, whereas the modular operations method is used on large exponential values. The attacker performs delay analysis to get how much time is required for calculating exponential results. Attackers can obtain private information like private keys by learning the computation time and using knowledge of the implementation technique. Most IoT devices will implement security measures like encryption to protect their sensitive information for security reasons. However, by performing a side-channel attack security mechanism can be broken.
- Cryptanalysis Attacks: The attacker in a cryptanalysis attack studies ciphertext, ciphers, and cryptosystems with the purpose of finding the encryption key being used by breaking the encryption scheme of the system. The attacker breaks cryptographic security systems and gets access to the encrypted messages, even without knowledge of the plaintext source, encryption key, or the algorithm used to encrypt it [121]. Secure hashing, digital signatures, and other cryptographic algorithms are also the targets of this attack. Based on the methodology used, there are different types of cryptanalysis attacks.
- -
- Ciphertext Only Attack: The attacker determines the plaintext accessing the ciphertext.
- -
- Known Plaintext Attack: The aim of this attack is to get ciphertext using plaintext. The attacker decrypts the ciphertext using the known parts of the ciphertext.
- -
- Chosen Plaintext Attack: In this attack, the attacker can choose plaintexts that are encrypted and find the encryption key.
- -
- Chosen Ciphertext Attack: Similar to a chosen-plaintext attack, an attacker gathers information by obtaining the decryptions of chosen ciphertexts. By utilizing the plaintext of chosen-ciphertext the attacker can find the hidden secret key used for decryption.
4.6.3. Network Attacks
- Traffic Analysis Attacks: Unlike eavesdropping attacks, the attacker does not need to compromise the original data, whereas the attacker listens to the network to gain some information using sniffing applications such as port scan, packet sniff, etc. Like eavesdropping attacks, in a traffic analysis attack, the adversary hears the communication flow of the network to analyze traffic to find critical nodes’ locations, the routing diagram, and even application patterns of behavior. Once an attacker reveals the required information, s/he can accurately host attacks like jamming, eavesdropping, sybil, etc., [126,127].
- RFID Cloning: Making a replica of a user’s RFID without knowledge is another way to overthrow RFID access systems. Even without accessing physically to the RFID card, an intruder can clone an RFID tag by copying data from the victim’s RFID tag onto another RFID tag [96]. The attacker can get the information and write the data to a similar blank RFID using off-the-shelf components by standing several feet away [128]. The integrity of the system will be violated as cloning results circulation of identical tags.
- RFID Spoofing: Unlike RFID cloning, in an RFID spoofing attack, an attacker does not physically replicate an RFID tag. Technically, cloning and spoofing attacks are made back-to-back. In this type of attack, an adversary impersonates a valid RFID tag to gain its privileges, reads, and records a data communication from an RFID tag. The attacker can obtain complete control of the system by posing as a legitimate source and sending his own data that includes the authentic tag ID. Spoofing attacks take place when a hacker successfully makes a position as an authorized user in the system [96,129].
- RFID Unauthorized Access: Different levels of security features can be available in RFID. If proper authentication mechanisms are not deployed in the RFID system, tags can be accessed by an attacker. The attacker can simply read, edit, or even destroy data on the RFID devices for his own gains. The attacker needs to execute complicated steps if strong level security measures such as access to the backend are required to retrieve the necessary credentials [130].
- Man In the Middle Attack: A perpetrator positions himself in an interface between two sensors, collecting private data and invading privacy by eavesdropping or impersonating one of the clients so that it looks like a normal information flow is taking place. The goal of this attempt is to obtain personal information that can be utilized for a variety of things, such as identity theft, unauthorized financial transfers, or unauthorized password changes. This attack relies exclusively on an IoT system’s network communication protocols. Therefore, physical presence is not necessary [94,131,132].
- Denial of Service: To carry out a successful denial of service attack, the attacker floods the IoT network with a large number of requests, resulting in a significant quantity of data traffic; this continues until the target cannot respond or simply crashes. In this attack, legitimate users are unable to use network resources to access information as all available resources are exhausted, which makes network resources unavailable to users. Moreover, many users’ unencrypted data can also be exposed [133,134].
- Sinkhole Attack: In a sinkhole attack, an adversary deceives the system by luring all data flow from neighboring WSN nodes into a metaphorical blackhole; the system is fooled into believing the data has already arrived its endpoint. The attacker uses a compromised node to attract network traffic by transmitting fraudulent routing information. The goal of the attacker is to breach the system’s integrity as well as disrupting network service. It prevents all packets from transferring, resulting in a sink or black hole in the network [135,136].
- Routing Information Attacks: In a routing information attack, the adversary uses a compromised node or a group of compromised nodes to make or change the routing information. The purpose of the attack is to obfuscate the system and make routing loops, permit or reject traffic, change the destination, provide fake error messages, shorten or extend source paths, or even partition the network; e.g., Hello Attack and Blackhole Attack [84,137].
- Sybil Attack: Sybil attacks are more common in networks with a large number of clients. A single node that unlawfully acquires the identities of numerous other nodes is referred to as a malicious node. The attacker uses the identities of the other nodes, causing the adjacent nodes to receive phony and incorrect information. The attacker can part in the distributed algorithm, such as the election where one sybil node has an identity more than once. It can also be selected as a part of the routing path, which can lead to a longer routing distance [138,139,140].
- Replay Attack: Attackers get information by eavesdropping on the messages of two parties, and the malicious node resends old packets to the overall system as broadcast or sent to a specific set of devices. When the other nodes receive these messages, they update their routing tables according to this expired information and reply regardless of whether the sender is transmitting any new packets or not. The Routing table and network topology will also be outdated, and with a huge number of packets replayed, both bandwidth and power will be consumed. This will result in the network’s activities being terminated sooner than expected, facilitating the impersonation attacks [20,86].
- HELLO flood attack: Some WSN routing protocols broadcast the “HELLO” packet to advertise themselves to their neighbors and construct a network topology. The attacker does not need to send legitimate traffic to conduct this attack. It can subsequently re-broadcast overhead packets with sufficient strength to deliver to every other network interface, leaving the network in disarray [141]. Though the malicious node is far away from network nodes, every node in the network will be convinced that the attacker is nearby. The majority of protocols that are impacted by this kind of attack depend on nearby nodes exchanging localized information to maintain topology or control flow.
- Blackhole attack: In this attack, a malicious node, instead of forwarding all the packets, may drop those, and it may drop all the data traffic around the malicious node. This attack is also referred to as “Selfishness”. Its impact is highest if the malicious node is a sinkhole [110].
- Wormhole attack: A wormhole attack necessitates the collaboration of two or more adversaries with excellent communication resources (e.g., power, bandwidth) and the ability to construct better communication lines (called “tunnels”) between them. Malicious nodes are not clustered together; instead, they are carefully located at opposite ends of a network, where they can get messages and replay them in separate portions via a tunnel. Other nodes use the tunnel as their communication path and go under the scrutiny of the adversaries [144,145,146].
- Grayhole attack: A grayhole attack is an alternate form of a blackhole attack. The difference between blackhole and grayhole is dropping packet count. Instead of dropping all the packets like a blackhole, grayhole drops those packets it selects [110].
4.6.4. Application Attacks or Software Attacks
- Virus and Worms: A virus is a small, self-contained computer software that can replicate and infect other computers in the same way that a real virus can. A virus is just one sort of “malicious logic” that can maltreat an IoT network. A computer worm is similar to a virus in that it spreads by itself rather than being disguised inside another software [170].
- Malicious Scripts: Usually, there is an internet connection in the IoT network. In this attack, an attacker fools the user, who controls the gateway, by visiting lucrative advertisements or websites and then running executable active-x scripts with malicious alterations to different parts of the system, which could lead to the system being shut down or data being stolen [171,172].
- Spyware and Adware: To propagate malware and harmful code, adversary attacks devices, such as IoT, use factory default user credentials, password brute-forcing, breaches, and manipulating weak configurations. Once the attacker has complete control, he can launch a DDoS assault against a target. A malicious party could insert harmful software into the system, which can result in data theft, data tampering, or even a denial of service [173].
- Trojan Horse: A Trojan Horse camouflage is a legitimate program where some previously defined event or date is present. This attack is triggered in the pre-set condition and then delivers a payload that may completely shut down the system [174].
- Denial of Service: An attacker can use distributed DDoS and DoS attacks to prevent users from accessing a system or network resource. This attack undermines the network or systems’ capacity to perform expected functions. This attack comes from numerous points, and it is difficult to defend against this attack [175].
- Distributed Reflection Denial of Service Attack (DRDoS): DRDoS is one form of DDoS attack. In this attack, an attacker preserves anonymity through an IP address by using a third party, called a reflector, which needs not be compromised [176]. Numerous victim machines that unintentionally take part in a DDoS attack on the attacker’s target are typically used in DRDoS attacks. Requests sent to the victim host computers are reflected back to the target from the victim hosts. The attacker sets the target’s IP address as the source IP address to the reflectors to flood the network with response packets. They typically also generate an increased volume of attack traffic [177]. The advantage of the attack is that the attacker’s identity will not be revealed as the attack will be done by reflectors, not by the attacker, which makes it hard to identify the original attacker and block the service. Another benefit of the DRDoS attack strategy is amplification. An attacker’s first request results in a response that is greater than what was sent when there are numerous victim servers involved. This increases the attack bandwidth and the likelihood that a denial of service outage will result from the attack. DNS, NTP, SNMP, and SSDP are the protocols for UDP-based DRDoS attacks; SYN and BGP are the protocols for TCP-based DRDoS attacks [178]. Firewalls, intrusion detection systems, machine learning, etc. can be used to mitigate DRDoS attacks [179].
- Firmware Hijacking: Hardware’s fundamental component is firmware. Every piece of hardware on a computer has this basic software preinstalled. Firmware modification or hijacking attack is one of the most catastrophic attacks where attackers can gain control of the entire system. It has already impacted various embedded systems such as telecommunication infrastructure, SCADA, and PLC systems [180].
- Botnet Attack: The botnet is a phrase derived from the concept of bot networks, where a bot is a computer program or robot that is automated. A botnet is a robot network. Usually, an attacker gains control by spreading a virus or other malicious code to take over a network of devices to create a botnet. This is not a malware attack, although it is carried out through compromising devices. An IoT Botnet is also a network of various malware-infected IoT devices, such as routers, wearables, and embedded technologies. This malware allows an attacker to control all the connected devices and eventually the network [181,182].
- Brute Force Password Attack: Brute force password attack or BFA is a search and find a method to gain privileged access where the attacker guesses possible combinations of a targeted password until the correct password is discovered [183]. Based on the length and complexity of the password, both time and the applied combination will be required. BFA is a password research technique that uses a variety of probable ASCII characters, either alone or in combination.
5. Security Mechanisms
- Uniqueness: It is required to have different responses for each challenge. It is determined by how distinct one chip is from another in terms of strings and ultimately process variation of PUFs. Hamming distance (HD) calculated with each response represents uniqueness. The number of bit differences between the two responses calculated the HD. Ideally, uniqueness should be 50%.
- Randomness: It is calculated based on the total count of “1”s and “0”s of a response. In response, it is expected that the presence of an equal number of “1”s and “0”s. If so, the PUF will have 100% randomness.
- Correctness: A PUF needs to generate the same CRP irrespective of external variables such as temperature, pressure, time, etc. In every operating condition, the ideal value is 100%.
- Reliability: A PUF, as the name implies, should be 100% reliable. Every time a challenge is presented, an ideal PUF will produce the same response.
- Uniformity: This measures how random the PUF is. The probability of “1”s and “0”s should be equal so that any intruders are unable to guess.
- Bit Aliasing: How a particular response bit across several chips are measured by bit aliasing, and the ideal value is 50%.
- Steadiness: All the responses should be identical when the same challenges are feeding to a PUF. Ideally, the value of intra-HD should be 0%.
6. IoT Security Solutions
6.1. PKI-Based
6.2. ABE-Based
6.3. ECG-Based
6.4. MAC-Based
6.5. ECC-Based
6.6. ML-Based
6.7. CHAP PPP-Based
6.8. PUF-Based
6.9. Blockchain-Based
7. Challenges and Future Directions
7.1. Lightweight Cryptographic Algorithms
7.2. Lightweight Authentication Frameworks
7.3. Data Processing
7.4. Scalability
7.5. Interoperability
7.6. Governance
7.7. Education and Training
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Tran-Dang, H.; Krommenacker, N.; Charpentier, P.; Kim, D.S. Toward the Internet of Things for Physical Internet: Perspectives and Challenges. IEEE Internet Things J. 2020, 7, 4711–4736. [Google Scholar] [CrossRef]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Vasseur, J.; Dunkels, A. Chapter 4-IPv6 for Smart Object Networks and the Internet of Things. In Interconnecting Smart Objects with IP; Elsevier: Amsterdam, The Netherlands, 2010; pp. 39–49. [Google Scholar]
- Song, Z.; Cárdenas, A.A.; Masuoka, R. Semantic Middleware for the Internet of Things. In Proceedings of the Internet of Things (IOT), Tokyo, Japan, 29 November–1 December 2010; pp. 1–8. [Google Scholar]
- Čolaković, A.; Hadžialić, M. Internet of Things (IoT): A Review of Enabling Technologies, Challenges, and Open Research Issues. Comput. Netw. 2018, 144, 17–39. [Google Scholar] [CrossRef]
- Zemrane, H.; Baddi, Y.; Hasbi, A. Comparison between IOT Protocols: ZigBee and WiFi using the OPNET Simulator. In Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications, Rabat, Morocco, 24–25 October 2018; pp. 1–6. [Google Scholar]
- Ray, P.P.; Agarwal, S. Bluetooth 5 and Internet of Things: Potential and architecture. In Proceedings of the International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India, 3–5 October 2016; pp. 1461–1465. [Google Scholar]
- Wang, Y.; Chen, C.; Jiang, Q. Security Algorithm of Internet of Things based on ZigBee Protocol. Clust. Comput. 2019, 22, 14759–14766. [Google Scholar] [CrossRef]
- Al Enany, M.O.; Harb, H.M.; Attiya, G. A Comparative Analysis of MQTT and IoT Application Protocols. In Proceedings of the International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 3–4 July 2021; pp. 1–6. [Google Scholar]
- Haxhibeqiri, J.; De Poorter, E.; Moerman, I.; Hoebeke, J. A survey of LoRaWAN for IoT: From Technology to Application. Sensors 2018, 18, 3995. [Google Scholar] [CrossRef] [PubMed]
- Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A.V. Software-Defined Industrial Internet of Things in the Context of Industry 4.0. IEEE Sens. J. 2016, 16, 7373–7380. [Google Scholar] [CrossRef]
- Mahmud, M.I.; Abdelgawad, A.; Yanambaka, V.P.; Yelamarthi, K. Packet Drop and RSSI Evaluation for LoRa: An Indoor Application Perspective. In Proceedings of the 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 14–31 July 2021; pp. 913–914. [Google Scholar]
- Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef]
- Raj, A.; Prakash, S. Internet of Everything: A survey based on Architecture, Issues and Challenges. In Proceedings of the 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gorakhpur, India, 2–4 November 2018; pp. 1–6. [Google Scholar]
- Miraz, M.H.; Ali, M.; Excell, P.S.; Picking, R. A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). In Proceedings of the Internet Technologies and Applications (ITA), Wrexham, UK, 8–11 September 2015; pp. 219–224. [Google Scholar]
- Farias da Costa, V.C.; Oliveira, L.; de Souza, J. Internet of Everything (IoE) Taxonomies: A Survey and a Novel Knowledge-Based Taxonomy. Sensors 2021, 21, 568. [Google Scholar] [CrossRef]
- Padhi, P.K.; Charrua-Santos, F. 6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework. Appl. Syst. Innov. 2021, 4, 11. [Google Scholar] [CrossRef]
- Garzia, F.; Papi, L. An Internet of Everything based Integrated Security System for Smart Archaeological Areas. In Proceedings of the IEEE International Carnahan Conference on Security Technology (ICCST), Orlando, FL, USA, 24–27 October 2016; pp. 1–8. [Google Scholar]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Capkun, S.; Buttyan, L.; Hubaux, J.P. Self-organized Public-key Management for Mobile Ad hoc Networks. IEEE Trans. Mob. Comput. 2003, 2, 52–64. [Google Scholar] [CrossRef]
- Delavar, M.; Mirzakuchaki, S.; Ameri, M.H.; Mohajeri, J. PUF-based Solutions for Secure Communications in Advanced Metering Infrastructure (AMI). Int. J. Commun. Syst. 2017, 30, e3195. [Google Scholar] [CrossRef]
- Shamsoshoara, A.; Korenda, A.; Afghah, F.; Zeadally, S. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Netw. 2020, 183, 107593. [Google Scholar] [CrossRef]
- Liu, Y.; Dai, H.N.; Wang, Q.; Shukla, M.K.; Imran, M. Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges. Comput. Commun. 2020, 155, 66–83. [Google Scholar] [CrossRef]
- DeNardis, L. The Internet in Everything: Freedom and Security in a World with No Off Switch; Yale University Press: New Haven, CT, USA, 2020. [Google Scholar]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
- Sharma, V.; You, I.; Andersson, K.; Palmieri, F.; Rehmani, M.H.; Lim, J. Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. IEEE Access 2020, 8, 167123–167163. [Google Scholar] [CrossRef]
- Barua, A.; Al Alamin, M.A.; Hossain, M.S.; Hossain, E. Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey. IEEE Open J. Commun. Soc. 2022, 3, 251–281. [Google Scholar] [CrossRef]
- Hameed, S.; Khan, F.I.; Hameed, B. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. J. Comput. Netw. Commun. 2019, 2019, 9629381. [Google Scholar] [CrossRef] [Green Version]
- Fernández-Caramés, T.M. From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things. IEEE Internet Things J. 2020, 7, 6457–6480. [Google Scholar] [CrossRef]
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
- Khan, M.N.; Rao, A.; Camtepe, S. Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. IEEE Internet Things J. 2021, 8, 4132–4156. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Song, Y.; Yu, F.R.; Zhou, L.; Yang, X.; He, Z. Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive Survey. IEEE Internet Things J. 2021, 8, 4250–4274. [Google Scholar] [CrossRef]
- Rafique, W.; Qi, L.; Yaqoob, I.; Imran, M.; Rasool, R.U.; Dou, W. Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1761–1804. [Google Scholar] [CrossRef]
- Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Wang, X. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies. IEEE/CAA J. Autom. Sin. 2021, 8, 718–752. [Google Scholar] [CrossRef]
- Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things. IEEE Internet Things J. 2021, 8, 4004–4022. [Google Scholar] [CrossRef]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on Blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Sadawi, A.A.; Hassan, M.S.; Ndiaye, M. A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
- Khor, J.H.; Sidorov, M.; Woon, P.Y. Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey. IEEE Internet Things J. 2021, 8, 11960–11982. [Google Scholar] [CrossRef]
- Arora, P.; Kaur, B.; Teixeira, M.A. Machine Learning-Based Security Solutions for Healthcare: An Overview. In Emerging Technologies for Computing, Communication and Smart Cities; Springer: Singapore, 2022; pp. 649–659. [Google Scholar]
- Gaurav, A.; Gupta, B.B.; Panigrahi, P.K. A Comprehensive Survey on Machine Learning Approaches for Malware Detection in IoT-based Enterprise Information System. Enterp. Inf. Syst. 2022, 1–25. [Google Scholar] [CrossRef]
- Gaur, A.; Scotney, B.; Parr, G.; McClean, S. Smart City Architecture and its Applications Based on IoT. Procedia Comput. Sci. 2015, 52, 1089–1094. [Google Scholar] [CrossRef]
- Du, R.; Santi, P.; Xiao, M.; Vasilakos, A.V.; Fischione, C. The Sensable City: A Survey on the Deployment and Management for Smart City Monitoring. IEEE Commun. Surv. Tutor. 2018, 21, 1533–1560. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. Sensors 2022, 22, 5517. [Google Scholar] [CrossRef]
- Sadhu, P.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things. IEEE Consum. Electron. Mag. 2022. early access. [Google Scholar] [CrossRef]
- Wei, K.; Zhang, L.; Guo, Y.; Jiang, X. Health Monitoring Based on Internet of Medical Things: Architecture, Enabling Technologies, and Applications. IEEE Access 2020, 8, 27468–27478. [Google Scholar] [CrossRef]
- Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 2020, 8, 8707–8718. [Google Scholar] [CrossRef]
- Healthcare Data Breaches Hit All-Time High in 2021. Available online: https://www.fiercehealthcare.com/health-tech/healthcare-data-breaches-hit-all-time-high-2021-impacting-45m-people (accessed on 4 April 2022).
- Burr, M.T. Reliability Demands will Drive Automation Investments. Fortnightly Magazine, 1 November 2003; 1–4. [Google Scholar]
- Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659. [Google Scholar] [CrossRef]
- Shakarian, P. Stuxnet: Cyberwar Revolution in Military Affairs; Technical Report; Military Academy: West Point, NY, USA, 2011. [Google Scholar]
- Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles. arXiv 2022, arXiv:2204.07709. [Google Scholar]
- Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Park, Y. Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges. IEEE Access 2020, 8, 54314–54344. [Google Scholar] [CrossRef]
- Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the IEEE World Congress on Services, Washington, DC, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
- Díaz López, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Moron Castro, S.; Nespoli, P.; Gómez Mármol, F. Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [Google Scholar] [CrossRef]
- Smart Yet Flawed: IoT Device Vulnerabilities Explained. Available online: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/smart-yet-flawed-iot-device-vulnerabilities-explained (accessed on 6 June 2021).
- Koley, S.; Ghosal, P. Addressing Hardware Security Challenges in Internet of Things: Recent Trends and Possible Solutions. In Proceedings of the IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, 10–14 August 2015; pp. 517–520. [Google Scholar]
- Venugopalan, V.; Patterson, C.D. Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things. J. Hardw. Syst. Secur. 2018, 2, 131–141. [Google Scholar] [CrossRef]
- Abdul-Ghani, H.A.; Konstantas, D. A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. J. Sens. Actuator Netw. 2019, 8, 22. [Google Scholar] [CrossRef]
- Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
- Zhang, P.; Nagarajan, S.G.; Nevat, I. Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things. IEEE Internet Things J. 2017, 4, 2199–2206. [Google Scholar] [CrossRef]
- Stan, O.; Bitton, R.; Ezrets, M.; Dadon, M.; Inokuchi, M.; Yoshinobu, O.; Tomohiko, Y.; Elovici, Y.; Shabtai, A. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1936–1954. [Google Scholar] [CrossRef]
- Spoofing Attack: IP, DNS & ARP. Available online: https://www.veracode.com/security/spoofing-attack (accessed on 6 June 2021).
- Zhang, C.; Hu, G.; Chen, G.; Sangaiah, A.K.; Zhang, P.; Yan, X.; Jiang, W. Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack. IEEE Access 2018, 6, 22764–22777. [Google Scholar] [CrossRef]
- Raguvaran, S. Spoofing Attack: Preventing in Wireless Networks. In Proceedings of the International Conference on Communication and Signal Processing, New York, NY, USA, 3–5 April 2014; pp. 117–121. [Google Scholar] [CrossRef]
- Hussain, M.A.; Jin, H.; Hussien, Z.A.; Abduljabbar, Z.A.; Abbdal, S.H.; Ibrahim, A. DNS Protection against Spoofing and Poisoning Attacks. In Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE), Beijing, China, 8–10 July 2016; pp. 1308–1312. [Google Scholar] [CrossRef]
- Maksutov, A.A.; Cherepanov, I.A.; Alekseev, M.S. Detection and Prevention of DNS Spoofing Attacks. In Proceedings of the Siberian Symposium on Data Science and Engineering (SSDSE), Novosibirsk, Russia, 12–13 April 2017; pp. 84–87. [Google Scholar] [CrossRef]
- Belapurkar, A.; Chakrabarti, A.; Ponnapalli, H.; Varadarajan, N.; Padmanabhuni, S.; Sundarrajan, S. Distributed Systems Security: Issues, Processes and Solutions; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
- Alam, S.; De, D. Analysis of Security Threats in Wireless Sensor Network. arXiv 2014, arXiv:1406.0298. [Google Scholar] [CrossRef]
- Mayzaud, A.; Badonnel, R.; Chrisment, I. A Taxonomy of Attacks in RPL-based Internet of Things. Int. J. Netw. Secur. 2016, 18, 459–473. [Google Scholar]
- Sikder, A.K.; Petracca, G.; Aksu, H.; Jaeger, T.; Uluagac, A.S. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. arXiv 2018, arXiv:1802.02041. [Google Scholar]
- Matyunin, N.; Szefer, J.; Biedermann, S.; Katzenbeisser, S. Covert Channels using Mobile Device’s Magnetic Field Sensors. In Proceedings of the 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016; pp. 525–532. [Google Scholar]
- Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of Security Attacks. In Proceedings of the 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 11–12 August 2016; pp. 321–326. [Google Scholar]
- Atamli, A.W.; Martin, A. Threat-Based Security Analysis for the Internet of Things. In Proceedings of the International Workshop on Secure Internet of Things, Wroclaw, Poland, 8–10 September 2014; pp. 35–43. [Google Scholar]
- Lu, Y.; Da Xu, L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2018, 6, 2103–2115. [Google Scholar] [CrossRef]
- Lin, H.; Bergmann, N.W. IoT Privacy and Security Challenges for Smart Home Environments. Information 2016, 7, 44. [Google Scholar] [CrossRef]
- Baccelli, E.; Gündoğan, C.; Hahm, O.; Kietzmann, P.; Lenders, M.S.; Petersen, H.; Schleiser, K.; Schmidt, T.C.; Wählisch, M. RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT. IEEE Internet Things J. 2018, 5, 4428–4440. [Google Scholar] [CrossRef]
- Eckmann, S.T.; Vigna, G.; Kemmerer, R.A. STATL: An Attack Language for State-based Intrusion Detection. J. Comput. Secur. 2002, 10, 71–103. [Google Scholar] [CrossRef]
- Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security Vulnerabilities and Challenges. In Proceedings of the IEEE symposium on computers and communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [Google Scholar]
- Deogirikar, J.; Vidhate, A. Security Attacks in IoT: A Survey. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [Google Scholar]
- Mosenia, A.; Jha, N.K. A Comprehensive Study of Security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 2016, 5, 586–602. [Google Scholar] [CrossRef]
- He, D.; Chan, S.; Guizani, M. Security in the Internet of Things Supported by Mobile Edge Computing. IEEE Commun. Mag. 2018, 56, 56–61. [Google Scholar] [CrossRef]
- Social Engineering. Available online: https://www.imperva.com/learn/application-security/social-engineering-attack/ (accessed on 6 June 2021).
- Pirretti, M.; Zhu, S.; Vijaykrishnan, N.; McDaniel, P.; Kandemir, M.; Brooks, R. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distrib. Sens. Netw. 2006, 2, 267–287. [Google Scholar] [CrossRef]
- Liu, D.; Yan, Z.; Ding, W.; Atiquzzaman, M. A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J. 2019, 6, 4946–4967. [Google Scholar] [CrossRef]
- Roman, R.; Lopez, J.; Mambo, M. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
- Gu, P.; Hua, C.; Xu, W.; Khatoun, R.; Wu, Y.; Serhrouchni, A. Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet Things J. 2020, 7, 5064–5077. [Google Scholar] [CrossRef]
- Khoo, B. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. In Proceedings of the International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Atlanta, GA, USA, 19–22 October 2011; pp. 709–712. [Google Scholar]
- Huang, W.; Zhang, Y.; Feng, Y. ACD: An Adaptable Approach for RFID Cloning Attack Detection. Sensors 2020, 20, 2378. [Google Scholar] [CrossRef]
- Farooq, M.U.; Waseem, M.; Khairi, A.; Mazhar, S. A Critical Analysis on the Security Concerns of Internet of Things (IoT). Int. J. Comput. Appl. 2015, 111, 1–6. [Google Scholar]
- Zhang, W.; Qu, B. Security Architecture of the Internet of Things Oriented to Perceptual Layer. Int. J. Comput. Consum. Control (IJ3C) 2013, 2, 37–45. [Google Scholar]
- Xiao, Q.; Gibbons, T.; Lebrun, H. RFID Technology, Security Vulnerabilities, and Countermeasures. In Supply Chain the Way to Flat Organization; Publisher-Intech: London, UK, 2009; pp. 357–382. [Google Scholar]
- Chen, K.; Zhang, S.; Li, Z.; Zhang, Y.; Deng, Q.; Ray, S.; Jin, Y. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2018, 2, 97–110. [Google Scholar] [CrossRef]
- Zhang, P.; Liu, J.; Shen, Y.; Li, H.; Jiang, X. Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 2020, 7, 3977–3990. [Google Scholar] [CrossRef]
- Signori, A.; Chiariotti, F.; Campagnaro, F.; Zorzi, M. A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks. IEEE Internet Things J. 2020, 7, 9793–9804. [Google Scholar] [CrossRef]
- Letafati, M.; Kuhestani, A.; Wong, K.K.; Piran, M.J. A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer. IEEE Internet Things J. 2021, 8, 4373–4388. [Google Scholar] [CrossRef]
- Angle, M.G.; Madnick, S.; Kirtley, J.L.; Khan, S. Identifying and Anticipating Cyberattacks That Could Cause Physical Damage to Industrial Control Systems. IEEE Power Energy Technol. Syst. J. 2019, 6, 172–182. [Google Scholar] [CrossRef]
- Alladi, T.; Chamola, V.; Sikdar, B.; Choo, K.K.R. Consumer IoT: Security Vulnerability Case Sudies and Solutions. IEEE Consum. Electron. Mag. 2020, 9, 17–25. [Google Scholar] [CrossRef]
- Margulies, J. Garage Door Openers: An Internet of Things Case Study. IEEE Secur. Priv. 2015, 13, 80–83. [Google Scholar] [CrossRef]
- Yi, Y.; Zhang, Z.; Yang, L.T.; Deng, X.; Yi, L.; Wang, X. Social Interaction and Information Diffusion in Social Internet of Things: Dynamics, Cloud-Edge, Traceability. IEEE Internet Things J. 2021, 8, 2177–2192. [Google Scholar] [CrossRef]
- Hu, C.; Pu, Y.; Yang, F.; Zhao, R.; Alrawais, A.; Xiang, T. Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 2020, 7, 9980–9994. [Google Scholar] [CrossRef]
- Li, B.; Ye, R.; Gu, G.; Liang, R.; Liu, W.; Cai, K. A Detection Mechanism on Malicious Nodes in IoT. Comput. Commun. 2020, 151, 51–59. [Google Scholar] [CrossRef]
- Fotohi, R.; Bari, S.F. A Novel Countermeasure Technique to Protect WSN against Denial-of-sleep Attacks using Firefly and Hopfield Neural Network (HNN) Algorithms. J. Supercomput. 2020, 76, 6860–6886. [Google Scholar] [CrossRef]
- Patil, B.; Agarkhed, J. An Exploratory Machine Learning Technique for Investigating Intrusion in Wireless Sensor Networks. In Proceedings of the IEEE Bangalore Humanitarian Technology Conference (B-HTC), Vijayapur, India, 8–10 October 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Liu, Z.; Pen, J. The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection. In Proceedings of the IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; pp. 1075–1082. [Google Scholar] [CrossRef]
- Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
- Ai, X.; Chen, H.; Lin, K.; Wang, Z.; Yu, J. Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. IEEE Trans. Inf. Forensics Secur. 2021, 16, 714–727. [Google Scholar] [CrossRef]
- Burmester, M.; Munilla, J.; Ortiz, A. Comments on “Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems”. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2929–2931. [Google Scholar] [CrossRef]
- Gandino, F.; Montrucchio, B.; Rebaudengo, M. Tampering in RFID: A Survey on Risks and Defenses. Mob. Netw. Appl. 2010, 15, 502–516. [Google Scholar] [CrossRef]
- Sivasubramanian, N.; Konganathan, G. A Novel Semi Fragile Watermarking Technique for Tamper Detection and Recovery using IWT and DCT. Computing 2020, 102, 1365–1384. [Google Scholar] [CrossRef]
- Aman, M.N.; Sikdar, B.; Chua, K.C.; Ali, A. Low Power Data Integrity in IoT Systems. IEEE Internet Things J. 2018, 5, 3102–3113. [Google Scholar] [CrossRef]
- Numan, M.; Subhan, F.; Khan, W.Z.; Hakak, S.; Haider, S.; Reddy, G.T.; Jolfaei, A.; Alazab, M. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks. IEEE Access 2020, 8, 65450–65461. [Google Scholar] [CrossRef]
- Zhou, B.; Li, S.; Wang, W.; Wang, J.; Cheng, Y.; Wu, J. An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs. IEEE Internet Things J. 2019, 6, 9738–9747. [Google Scholar] [CrossRef]
- Guo, S.; Wang, J.; Chen, Z.; Li, Y.; Lu, Z. Securing IoT Space via Hardware Trojan Detection. IEEE Internet Things J. 2020, 7, 11115–11122. [Google Scholar] [CrossRef]
- Chen, Z.; Guo, S.; Wang, J.; Li, Y.; Lu, Z. Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans. IEEE Internet Things J. 2019, 6, 7061–7068. [Google Scholar] [CrossRef]
- Bhushan, B.; Sahoo, G.; Rai, A.K. Man-in-the-Middle Attack in Wireless and Computer Networking—A Review. In Proceedings of the 3rd International Conference on Advances in Computing, Communication Automation (ICACCA) (Fall), Dehradun, India, 15–16 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Cryptanalysis. Available online: https://searchsecurity.techtarget.com/definition/cryptanalysis (accessed on 6 June 2021).
- Nia, A.M.; Sur-Kolay, S.; Raghunathan, A.; Jha, N.K. Physiological Information Leakage: A New Frontier in Health Information Security. IEEE Trans. Emerg. Top. Comput. 2015, 4, 321–334. [Google Scholar]
- Carluccio, D.; Lemke, K.; Paar, C. Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. In Proceedings of the ECrypt Workshop on RFID and Lightweight Crypto, Graz, Austria, 14–15 July 2005. [Google Scholar]
- Zhang, C.; Liu, Z.; Chen, Y.; Lu, J.; Liu, D. A Flexible and Generic Gaussian Sampler with Power Side-Channel Countermeasures for Quantum-Secure Internet of Things. IEEE Internet Things J. 2020, 7, 8167–8177. [Google Scholar] [CrossRef]
- Aboushosha, B.; Ramadan, R.A.; Dwivedi, A.D.; El-Sayed, A.; Dessouky, M.M. SLIM: A Lightweight Block Cipher for Internet of Health Things. IEEE Access 2020, 8, 203747–203757. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, C.; Fang, Y. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis. IEEE Internet Things J. 2018, 5, 1206–1217. [Google Scholar] [CrossRef]
- Ahmed, M.M.; Dhavlle, A.; Mansoor, N.; Sutradhar, P.; Dinakarrao, S.M.P.; Basu, K.; Ganguly, A. Defense against on-chip Trojans Enabling Traffic Analysis Attacks. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Kolkata, India, 15–17 December 2020; pp. 1–6. [Google Scholar]
- Rfid Card Security and Attacks. Available online: https://www.sikich.com/insight/rfid-card-security-attacks-and-prevention/ (accessed on 6 June 2021).
- Zhen-hua, D.; Jin-tao, L.; Bo, F. A Taxonomy Model of RFID Security Threats. In Proceedings of the 11th IEEE International Conference on Communication Technology, Hangzhou, China, 19–21 November 2008. [Google Scholar]
- Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S. Classifying RFID Attacks and Defenses. Inf. Syst. Front. 2010, 12, 491–505. [Google Scholar] [CrossRef]
- Yang, Y.; Wei, X.; Xu, R.; Peng, L.; Zhang, L.; Ge, L. Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency. IEEE Access 2020, 8, 103860–103874. [Google Scholar] [CrossRef]
- Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [Google Scholar] [CrossRef]
- Ghahramani, M.; Javidan, R.; Shojafar, M.; Taheri, R.; Alazab, M.; Tafazolli, R. RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack. IEEE Internet Things J. 2021, 8, 3619–3635. [Google Scholar] [CrossRef]
- Borgiani, V.; Moratori, P.; Kazienko, J.F.; Tubino, E.R.R.; Quincozes, S.E. Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks within Industrial Internet of Things. IEEE Internet Things J. 2021, 8, 4569–4578. [Google Scholar] [CrossRef]
- Zaminkar, M.; Fotohi, R. SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wirel. Pers. Commun. 2020, 114, 1287–1312. [Google Scholar] [CrossRef]
- Liu, Y.; Ma, M.; Liu, X.; Xiong, N.N.; Liu, A.; Zhu, Y. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security. IEEE Trans. Netw. Sci. Eng. 2018, 7, 356–372. [Google Scholar] [CrossRef]
- Perazzo, P.; Vallati, C.; Anastasi, G.; Dini, G. DIO Suppression Attack against Routing in the Internet of Things. IEEE Commun. Lett. 2017, 21, 2524–2527. [Google Scholar] [CrossRef]
- Pu, C. Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 2020, 7, 4937–4949. [Google Scholar] [CrossRef]
- Murali, S.; Jamalipour, A. A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things. IEEE Internet Things J. 2020, 7, 379–388. [Google Scholar] [CrossRef]
- Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet Things J. 2019, 6, 379–387. [Google Scholar] [CrossRef]
- Singh, V.P.; Jain, S.; Singhai, J. Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks. Int. J. Comput. Sci. Issues (IJCSI) 2010, 7, 23. [Google Scholar]
- Kaushik, I.; Sharma, N. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. In Collection of Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario’s; Springer: Berlin/Heidelberg, Germany, 2020; pp. 401–416. [Google Scholar]
- Abu Zant, M.; Yasin, A. Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). Secur. Commun. Netw. 2019, 2019, 8249108. [Google Scholar] [CrossRef]
- Raoof, A.; Matrawy, A.; Lung, C.H. Enhancing Routing Security in IoT: Performance Evaluation of RPL’s Secure Mode Under Attacks. IEEE Internet Things J. 2020, 7, 11536–11546. [Google Scholar] [CrossRef]
- Stute, M.; Agarwal, P.; Kumar, A.; Asadi, A.; Hollick, M. LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. IEEE Internet Things J. 2020, 7, 6802–6816. [Google Scholar] [CrossRef]
- Deshmukh-Bhosale, S.; Sonavane, S.S. A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things. Procedia Manuf. 2019, 32, 840–847. [Google Scholar] [CrossRef]
- Li, F.; Ren, P.; Yang, G.; Sun, Y.; Wang, Y.; Wang, Y.; Li, S.; Zhou, H. An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Secur. Commun. Netw. 2021, 2021, 6670847. [Google Scholar] [CrossRef]
- Chen, H.; Ai, X.; Lin, K.; Yan, N.; Wang, Z.; Jiang, N.; Yu, J. DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Ind. Inform. 2021, 18, 345–355. [Google Scholar] [CrossRef]
- Shen, H.; Shen, J.; Khan, M.K.; Lee, J.H. Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wirel. Pers. Commun. 2017, 96, 5253–5266. [Google Scholar] [CrossRef]
- Ding, H.; Han, J.; Zhang, Y.; Xiao, F.; Xi, W.; Wang, G.; Jiang, Z. Preventing Unauthorized Access on Passive Tags. In Proceedings of the IEEE INFOCOM—IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 1115–1123. [Google Scholar] [CrossRef]
- Allah, O.A.; Abdalla, S.; Mekki, M.; Awadallah, A. RFID based Access Control and Registration System. In Proceedings of the International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 12–14 August 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Puthal, D.; Nepal, S.; Ranjan, R.; Chen, J. Threats to Networking Cloud and Edge Datacenters in the Internet of Things. IEEE Cloud Comput. 2016, 3, 64–71. [Google Scholar] [CrossRef]
- Tian, Q.; Lin, Y.; Guo, X.; Wen, J.; Fang, Y.; Rodriguez, J.; Mumtaz, S. New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint. IEEE Internet Things J. 2019, 6, 7980–7987. [Google Scholar] [CrossRef]
- Deng, J.; Han, R.; Mishra, S. Defending against Path-based DoS Attacks in Wireless Sensor Networks. In Proceedings of the the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Los Angeles, CA, USA, 7–11 November 2005; pp. 89–96. [Google Scholar]
- Gupta, H.P.; Rao, S.; Yadav, A.K.; Dutta, T. Geographic Routing in Clustered Wireless Sensor Networks Among Obstacles. IEEE Sens. J. 2014, 15, 2984–2992. [Google Scholar] [CrossRef]
- Wang, Y.C.; Tseng, Y.C. Attacks and Defenses of Routing Mechanisms in ad hoc and Sensor Networks. In Security in Sensor Networks; CRC Press: Boca Raton, FL, USA, 2007; pp. 3–25. [Google Scholar]
- Junejo, A.K.; Komninos, N.; McCann, J.A. A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems. IEEE Internet Things J. 2021, 8, 6840–6852. [Google Scholar] [CrossRef]
- Shafique, U.; Khan, A.; Rehman, A.; Bashir, F.; Alam, M. Detection of Rank Attack in Routing Protocol for Low Power and Lossy Networks. Ann. Telecommun. 2018, 73, 429–438. [Google Scholar] [CrossRef]
- Sarigiannidis, P.; Karapistoli, E.; Economides, A.A. Detecting Sybil Attacks in Wireless Sensor Networks using UWB Ranging-based Information. Expert Syst. Appl. 2015, 42, 7560–7572. [Google Scholar] [CrossRef]
- Zhang, Y.; Liu, W.; Lou, W.; Fang, Y. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2006, 24, 247–260. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Choo, K.K.R. Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. IEEE Internet Things J. 2020, 7, 4598–4606. [Google Scholar] [CrossRef]
- Zhang, N.; Fang, X.; Wang, Y.; Wu, S.; Wu, H.; Kar, D.; Zhang, H. Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding. IEEE Internet Things J. 2020, 7, 9001–9010. [Google Scholar] [CrossRef]
- Cakir, S.; Toklu, S.; Yalcin, N. RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning. IEEE Access 2020, 8, 183678–183689. [Google Scholar] [CrossRef]
- Lai, W.K.; Chiu, C.T. Probabilistic Second-Chance Broadcasting with/without Global Positioning System Information in Wireless Ad Hoc Networks. IEEE Access 2020, 8, 212608–212622. [Google Scholar] [CrossRef]
- Yang, J.; Li, T.; Liang, G.; Wang, Y.; Gao, T.; Zhu, F. Spam Transaction Attack Detection Model based on GRU and WGAN-div. Comput. Commun. 2020, 161, 172–182. [Google Scholar] [CrossRef]
- Kumar, A.; Varadarajan, V.; Kumar, A.; Dadheech, P.; Choudhary, S.S.; Kumar, V.A.; Panigrahi, B.K.; Veluvolu, K.C. Black hole Attack Detection in Vehicular ad-hoc Network using Secure AODV Routing Algorithm. Microprocess. Microsystems 2021, 80, 103352. [Google Scholar] [CrossRef]
- Yang, N.; Chen, K.; Wang, M. SmartDetour: Defending Blackhole and Content Poisoning Attacks in IoT NDN Networks. IEEE Internet Things J. 2021, 8, 12119–12136. [Google Scholar] [CrossRef]
- Yu, B.; Xiao, B. Detecting Selective Forwarding aAttacks in Wireless Sensor Networks. In Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes, Greece, 25–29 April 2006; p. 8. [Google Scholar]
- Wang, G.; Zhang, W.; Cao, G.; La Porta, T. On Supporting Distributed Collaboration in Sensor Networks. In Proceedings of the IEEE Military Communications Conference, MILCOM, Boston, MA, USA, 13–16 April 2003; Volume 2, pp. 752–757. [Google Scholar]
- Xie, B.; Liu, M. Dynamics Stability and Optimal Control of Virus Propagation Based on the E-Mail Network. IEEE Access 2021, 9, 32449–32456. [Google Scholar] [CrossRef]
- Khan, N.; Abdullah, J.; Khan, A.S. Defending Malicious Script Attacks Using Machine Learning Classifiers. Wirel. Commun. Mob. Comput. 2017, 2017, 5360472. [Google Scholar] [CrossRef]
- Rodríguez, G.E.; Torres, J.G.; Flores, P.; Benavides, D.E. Cross-site Scripting (XSS) Attacks and Mitigation: A Survey. Comput. Netw. 2020, 166, 106960. [Google Scholar] [CrossRef]
- Mallikarajunan, K.N.; Preethi, S.; Selvalakshmi, S.; Nithish, N. Detection of Spyware in Software Using Virtual Environment. In Proceedings of the 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1138–1142. [Google Scholar] [CrossRef]
- Bhunia, S.; Hsiao, M.S.; Banga, M.; Narasimhan, S. Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proc. IEEE 2014, 102, 1229–1247. [Google Scholar] [CrossRef]
- Daia, A.S.A.; Ramadan, R.A.; Fayek, M.B.; AETiC, A. Sensor Networks Attacks Classifications and Mitigation. Ann. Emerg. Technol. Comput. (Aetic) 2018, 2, 28–43. [Google Scholar] [CrossRef]
- Šimon, M.; Huraj, L.; Horák, T. DDoS reflection attack based on IoT: A case study. In Proceedings of the Computer Science On-line Conference, Las Vegas, NV, USA, 12–14 December 2018; pp. 44–52. [Google Scholar]
- Horak, T.; Cervenanska, Z.; Huraj, L.; Vazan, P.; Janosik, J.; Tanuska, P. The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept. IFAC-PapersOnLine 2020, 53, 11237–11242. [Google Scholar] [CrossRef]
- Nuiaa, R.R.; Manickam, S.; Alsaeedi, A.H. Distributed reflection denial of service attack: A critical review. Int. J. Electr. Comput. Eng. 2021, 11, 5327. [Google Scholar] [CrossRef]
- Huraj, L.; Horak, T.; Strelec, P.; Tanuska, P. Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci. 2021, 11, 1847. [Google Scholar] [CrossRef]
- Bettayeb, M.; Nasir, Q.; Talib, M.A. Firmware Update aAttacks and Security for IoT Devices: Survey. In Proceedings of the the ArabWIC 6th Annual International Conference Research Track, Rabat, Morocco, 7–9 March 2019; pp. 1–6. [Google Scholar]
- Mahjabin, T.; Xiao, Y.; Li, T.; Chen, C.L.P. Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks. IEEE Internet Things J. 2020, 7, 986–1000. [Google Scholar] [CrossRef]
- Habibi, J.; Midi, D.; Mudgerikar, A.; Bertino, E. Heimdall: Mitigating the Internet of Insecure Things. IEEE Internet Things J. 2017, 4, 968–978. [Google Scholar] [CrossRef]
- Stiawan, D.; Idris, M.; Malik, R.F.; Nurmaini, S.; Alsharif, N.; Budiarto, R. Investigating Brute Force Attack Patterns in IoT Network. J. Electr. Comput. Eng. 2019, 2019, 4568368. [Google Scholar] [CrossRef]
- Wu, M.; Miller, R.C.; Garfinkel, S.L. Do Security Toolbars actually Prevent Phishing Attacks? In Proceedings of the the SIGCHI Conference on Human Factors in Computing Systems, Montréal, QC, Canada, 22–27 April 2006; pp. 601–610. [Google Scholar]
- Hong, J. The State of Phishing Attacks. Commun. ACM 2012, 55, 74–81. [Google Scholar] [CrossRef]
- Acharya, J.; Chuadhary, A.; Chhabria, A.; Jangale, S. Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching. In Proceedings of the 2nd International Conference for Emerging Technology (INCET), Belagavi, India, 21–23 May 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Wang, G.; Xie, S.; Zhang, X.; Gao, J.; Wei, F.; Zhao, B.; Wang, C.; Lv, S. An Effective Method to Safeguard Cyber Security by Preventing Malicious Data. IEEE Access 2019, 7, 166282–166291. [Google Scholar] [CrossRef]
- Suryati, O.T.; Budiono, A. Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method. Int. J. Adv. Data Inf. Syst. 2020, 1, 1–8. [Google Scholar] [CrossRef]
- Pan, Y.; Zhang, L.; Huang, D. Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution. Appl. Sci. 2020, 10, 7788. [Google Scholar] [CrossRef]
- Insecurity of Things: The IoT Devices You Deploy May Be Trojan Horses. Available online: https://venturebeat.com/2016/04/17/insecurity-of-things-the-iot-devices-you-deploy-may-be-trojan-horses/ (accessed on 6 June 2021).
- Khan, H.A.; Sehatbakhsh, N.; Nguyen, L.N.; Callan, R.L.; Yeredor, A.; Prvulovic, M.; Zajić, A. IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1150–1163. [Google Scholar] [CrossRef]
- Jagadeesan, S.; Amutha, B. An Efficient Botnet Detection with the Enhanced Support Vector Neural Network. Measurement 2021, 176, 109140. [Google Scholar] [CrossRef]
- Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks. IEEE Internet Things J. 2021, 8, 4944–4956. [Google Scholar] [CrossRef]
- Salamatian, S.; Huleihel, W.; Beirami, A.; Cohen, A.; Médard, M. Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3749–3759. [Google Scholar] [CrossRef]
- Alsaleh, M.; Mannan, M.; van Oorschot, P.C. Revisiting Defenses against Large-Scale Online Password Guessing Attacks. IEEE Trans. Dependable Secur. Comput. 2012, 9, 128–141. [Google Scholar] [CrossRef]
- Ali, M.; Baloch, A.; Waheed, A.; Zareei, M.; Manzoor, R.; Sajid, H.; Alanazi, F. A Simple and Secure Reformation-Based Password Scheme. IEEE Access 2021, 9, 11655–11674. [Google Scholar] [CrossRef]
- Gutierrez, C.N.; Kim, T.; Corte, R.D.; Avery, J.; Goldwasser, D.; Cinque, M.; Bagchi, S. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Trans. Dependable Secur. Comput. 2018, 15, 988–1001. [Google Scholar] [CrossRef]
- Alsariera, Y.A.; Adeyemo, V.E.; Balogun, A.O.; Alazzawi, A.K. AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites. IEEE Access 2020, 8, 142532–142542. [Google Scholar] [CrossRef]
- Gerjuoy, E. Shor’s Factoring Algorithm and Modern Cryptography. An Illustration of the Capabilities Inherent in Quantum Computers. Am. J. Phys. 2005, 73, 521–540. [Google Scholar] [CrossRef]
- Cultice, T.; Thapliyal, H. PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security. Information 2022, 13, 382. [Google Scholar] [CrossRef]
- Khaliq, A.A.; Anjum, A.; Ajmal, A.B.; Webber, J.L.; Mehbodniya, A.; Khan, S. A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy. IEEE Access 2022, 10, 56410–56426. [Google Scholar] [CrossRef]
- Barker, E.; Roginsky, A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. NIST Spec. Publ. 2011, 800, 131A. [Google Scholar]
- Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Novel FinFET Based Physical Unclonable Functions for Efficient Security Integration in the IoT. In Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India, 19–21 December 2016; pp. 172–177. [Google Scholar]
- Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Making Use of Manufacturing Process Variations: A Dopingless Transistor Based-PUF for Hardware-Assisted Security. IEEE Trans. Semicond. Manuf. 2018, 31, 285–294. [Google Scholar] [CrossRef]
- Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon Physical Random Functions. In Proceedings of the the 9th ACM Conference on Computer and Communications Security, Washingtion, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
- Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. PIM: A PUF-Based Host Tracking Protocol for Privacy Aware Contact Tracing in Crowded Areas. IEEE Consum. Electron. Mag. 2021, 10, 90–98. [Google Scholar] [CrossRef]
- Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Singh, J. Secure Multi-key Generation Using Ring Oscillator Based Physical Unclonable Function. In Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India, 19–21 December 2016; pp. 200–205. [Google Scholar]
- Joshi, S.; Mohanty, S.P.; Kougianos, E. Everything You Wanted to Know about PUFs. IEEE Potentials 2017, 36, 38–46. [Google Scholar] [CrossRef]
- Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Performance Analysis of Ring Oscillator PUF for Robust Security in Smart Transportation. In Proceedings of the IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 14 June–31 July 2021; pp. 301–302. [Google Scholar]
- Maitra, S.; Yanambaka, V.P.; Abdelgawad, A.; Puthal, D.; Yelamarthi, K. Proof-of-Authentication Consensus Algorithm: Blockchain-based IoT Implementation. In Proceedings of the IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–6 June 2020; pp. 1–2. [Google Scholar]
- Puthal, D.; Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E. PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks. arXiv 2020, arXiv:2001.07297. [Google Scholar]
- Mohanta, B.K.; Jena, D.; Ramasubbareddy, S.; Daneshmand, M.; Gandomi, A.H. Addressing Security and Privacy Issues of IoT Using Blockchain Technology. IEEE Internet Things J. 2020, 8, 881–888. [Google Scholar] [CrossRef]
- Singh, R.; Dwivedi, A.D.; Srivastava, G. Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention. Sensors 2020, 20, 3951. [Google Scholar] [CrossRef]
- Guo, L.; Dong, M.; Ota, K.; Li, Q.; Ye, T.; Wu, J.; Li, J. A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle. IEEE Internet Things J. 2017, 4, 601–610. [Google Scholar] [CrossRef]
- Li, J.; Ji, Y.; Choo, K.K.R.; Hogrefe, D. CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2019, 6, 10332–10343. [Google Scholar] [CrossRef]
- Yasuda, M.; Shimoyama, T.; Kogure, J.; Izu, T. Computational hardness of IFP and ECDLP. Appl. Algebra Eng. Commun. Comput. 2016, 27, 493–521. [Google Scholar] [CrossRef]
- Maurer, U.; Wolf, S. Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms. In Proceedings of the 1998 IEEE International Symposium on Information Theory (Cat. No. 98CH36252), Cambridge, MA, USA, 16–21 August 1998; p. 327. [Google Scholar]
- Kerrache, C.A.; Lagraa, N.; Hussain, R.; Ahmed, S.H.; Benslimane, A.; Calafate, C.T.; Cano, J.C.; Vegni, A.M. TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles. IEEE Internet Things J. 2018, 6, 5870–5877. [Google Scholar] [CrossRef]
- Al-Absi, M.A.; Al-Absi, A.A.; Fu, R.; Kim, K.H.; Lee, Y.S.; Lee, B.G.; Lee, S.G.; Lee, H.J. Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network. Sensors 2021, 21, 4935. [Google Scholar] [CrossRef]
- Ambika, R.; Ramachandran, S.; Kashwan, K.R. Data Security using Serial Commutative RSA CORE for Multiple FPGA System. In Proceedings of the 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 6–8 March 2014; pp. 1–5. [Google Scholar] [CrossRef]
- Meshram, C.; Ibrahim, R.W.; Deng, L.; Shende, S.W.; Meshram, S.G.; Barve, S.K. A Robust Smart Card and Remote User Password-based Authentication Protocol using Extended Chaotic Maps under Smart Cities Environment. Soft Comput. 2021, 25, 10037–10051. [Google Scholar] [CrossRef]
- Han, M.; Zhu, M.; Cheng, P.; Yin, Z.; Qu, H. Implementing an Efficient Secure Attribute-Based Encryption System for IoV Using Association Rules. Symmetry 2021, 13, 1177. [Google Scholar] [CrossRef]
- Hwang, Y.W.; Lee, I.Y. A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment. Sensors 2020, 20, 4934. [Google Scholar] [CrossRef]
- Huang, P.; Guo, L.; Li, M.; Fang, Y. Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare. IEEE Internet Things J. 2019, 6, 9200–9210. [Google Scholar] [CrossRef]
- Koblitz, N. Elliptic Curve Cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Black, J.R., Jr. Message Authentication Codes; University of California: Davis, CA, USA, 2000. [Google Scholar]
- Siddiqi, M.A.; Doerr, C.; Strydis, C. IMDfence: Architecting a Secure Protocol for Implantable Medical Devices. IEEE Access 2020, 8, 147948–147964. [Google Scholar] [CrossRef]
- Hahn, C.; Kwon, H.; Hur, J. Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet Things J. 2018, 6, 6301–6309. [Google Scholar] [CrossRef]
- Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [Google Scholar] [CrossRef]
- Wu, F.; Zhang, X.; Zhang, C.; Chen, X.; Fan, W.; Liu, Y. Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks. IEEE Internet Things J. 2020, 7, 8144–8156. [Google Scholar] [CrossRef]
- Thumbur, G.; Rao, G.S.; Reddy, P.V.; Gayathri, N.; Reddy, D.K.; Padmavathamma, M. Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Internet Things J. 2020, 8, 1908–1920. [Google Scholar] [CrossRef]
- Zhang, J.; Zhong, H.; Cui, J.; Xu, Y.; Liu, L. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks. IEEE Internet Things J. 2020, 7, 3462–3473. [Google Scholar] [CrossRef]
- Ghahramani, M.; Javidan, R.; Shojafar, M. A Secure Biometric-based Authentication Protocol for Global Mobility Networks in Smart Cities. J. Supercomput. 2020, 76, 8729–8755. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Wu, F.; Choo, K.K.R. A Robust Biometrics based Three-factor Authentication Scheme for Global Mobility Networks in Smart City. Future Gener. Comput. Syst. 2018, 83, 607–618. [Google Scholar] [CrossRef]
- Xie, Q.; Li, K.; Tan, X.; Han, L.; Tang, W.; Hu, B. A Secure and Privacy-Preserving Authentication Protocol for Wireless Sensor Networks in Smart City. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
- Banerjee, S.; Chunka, C.; Sen, S.; Goswami, R.S. An Enhanced and Secure Biometric based User Authentication Scheme in Wireless Sensor Networks using Smart Cards. Wirel. Pers. Commun. 2019, 107, 243–270. [Google Scholar] [CrossRef]
- Xiao, L.; Cai, J.; Qiu, M.; Liu, M. A Secure Identity Authentication Protocol for Edge Data in Smart Grid Environment. In Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Washington DC, USA, 26–28 July 2021; pp. 188–193. [Google Scholar]
- Chen, C.M.; Chen, L.; Huang, Y.; Kumar, S.; Wu, J.M.T. Lightweight Authentication Protocol in Edge-based Smart Grid Environment. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 119. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Wazid, M.; Vasilakos, A.V. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet Things J. 2021, 8, 7727–7744. [Google Scholar] [CrossRef]
- Velliangiri, S.; Manoharn, R.; Ramachandran, S.; Venkatesan, K.; Rajasekar, V.; Karthikeyan, P.; Kumar, P.; Kumar, A.; Dhanabalan, S.S. An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based on Elliptic Curve Cryptography. IEEE Trans. Ind. Inform. 2022, 18, 6494–6502. [Google Scholar] [CrossRef]
- Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
- Ali, I.; Chen, Y.; Pan, C.; Zhou, A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2022, 9, 4435–4450. [Google Scholar] [CrossRef]
- Sharma, P.; Liu, H. A Machine-Learning-Based Data-Centric Misbehavior Detection Model for Internet of Vehicles. IEEE Internet Things J. 2020, 8, 4991–4999. [Google Scholar] [CrossRef]
- Pascale, F.; Adinolfi, E.A.; Coppola, S.; Santonicola, E. Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles. Electronics 2021, 10, 1765. [Google Scholar] [CrossRef]
- Pradeep, R.; Sunitha, N. Formal Verification of CHAP PPP Authentication Protocol for Smart City/Safe City Applications. J. Phys. Conf. 2022, 2161, 012046. [Google Scholar] [CrossRef]
- Wang, L.; Liu, X. NOTSA: Novel OBU with Three-Level Security Architecture for Internet of Vehicles. IEEE Internet Things J. 2018, 5, 3548–3558. [Google Scholar] [CrossRef]
- Alladi, T.; Chakravarty, S.; Chamola, V.; Guizani, M. A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario. IEEE Trans. Veh. Technol. 2020, 69, 14188–14197. [Google Scholar] [CrossRef]
- Aman, M.N.; Javaid, U.; Sikdar, B. A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
- Alladi, T.; Bansal, G.; Chamola, V.; Guizani, M. SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. IEEE Trans. Veh. Technol. 2020, 69, 15068–15077. [Google Scholar] [CrossRef]
- Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Puthal, D. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things. IEEE Trans. Consum. Electron. 2019, 65, 388–397. [Google Scholar] [CrossRef]
- Badar, H.M.S.; Qadri, S.; Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumar, N. An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function. IEEE Trans. Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
- Tanveer, M.; Shah, H.; Alkhayyat, A.; Chaudhry, S.A.; Ahmad, M. ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids. IEEE Access 2021, 9, 143366–143377. [Google Scholar] [CrossRef]
- Lee, T.F.; Ye, X.; Lin, S.H. Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things. IEEE Internet Things J. 2022, 9, 15336–15348. [Google Scholar] [CrossRef]
- Jiang, T.; Fang, H.; Wang, H. Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis. IEEE Internet Things J. 2018, 6, 4640–4649. [Google Scholar] [CrossRef]
- Liu, K.; Chen, W.; Zheng, Z.; Li, Z.; Liang, W. A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles. IEEE Internet Things J. 2019, 6, 9098–9111. [Google Scholar] [CrossRef]
- Yin, B.; Wu, Y.; Hu, T.; Dong, J.; Jiang, Z. An Efficient Collaboration and Incentive Mechanism for Internet of Vehicles (IoV) with Secured Information Exchange Based on Blockchains. IEEE Internet Things J. 2019, 7, 1582–1593. [Google Scholar] [CrossRef]
- Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
- Gao, J.; Agyekum, K.O.B.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 2019, 7, 4278–4291. [Google Scholar] [CrossRef]
- Xu, X.; Zhao, H.; Yao, H.; Wang, S. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet Things J. 2020, 8, 2431–2443. [Google Scholar] [CrossRef]
- Javaid, U.; Aman, M.N.; Sikdar, B. A Scalable Protocol for Driving Trust Management in Internet of Vehicles with Blockchain. IEEE Internet Things J. 2020, 7, 11815–11829. [Google Scholar] [CrossRef]
- Vivekanandan, M.; Sastry, V.N.; Srinivasulu Reddy, U. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 2021, 14, 403–419. [Google Scholar] [CrossRef]
- Wang, W.; Qiu, C.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things J. 2021, 9, 8883–8891. [Google Scholar] [CrossRef]
- Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
- Yang, Y.; Wei, L.; Wu, J.; Long, C.; Li, B. A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network. IEEE Internet Things J. 2022, 9, 8078–8090. [Google Scholar] [CrossRef]
- Cheng, G.; Chen, Y.; Deng, S.; Gao, H.; Yin, J. A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing. IEEE Trans. Comput. Soc. Syst. 2022, 9, 146–158. [Google Scholar] [CrossRef]
- Chow, S.S.; Boyd, C.; Nieto, J.M.G. Security-mediated Certificateless Cryptography. In Proceedings of the International Workshop on Public Key Cryptography, New York, NY, USA, 24–26 April 2006; pp. 508–524. [Google Scholar]
- Huang, D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. Int. J. Secur. Netw. 2007, 2, 272–283. [Google Scholar] [CrossRef]
- Xu, Z.; Li, F.; Deng, H.; Tan, M.; Zhang, J.; Xu, J. A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol. Sensors 2020, 20, 4835. [Google Scholar] [CrossRef]
- Xu, Z.; Liang, W.; Li, K.C.; Xu, J.; Zomaya, A.Y.; Zhang, J. A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Trans. Ind. Inform. 2022, 18, 7118–7127. [Google Scholar] [CrossRef]
Notations | Description | Notations | Description | Notations | Description |
---|---|---|---|---|---|
IP | Internet Protocol | IoMT | Internet of Medical Things | IoV | Internet of Vehicles |
SG | Smart grid | PUF | Physical unclonable function | V2X | Vehicle-to-everything |
V2V | Vehicle-to-vehicle | VANET | Vehicular Adhoc Network | V2S | Vehicle-to-sensors |
V2I | Vehicle-to-infrastructure | V2N | Vehicle-to-network | V2P | Vehicle-to-pedestrian |
RFID | Radio-frequency identification | WiFi | Wireless Fidelity | NFC | Near-field communication |
GPS | Global Positioning System | LTE | Long-Term Evolution | MAC | Media Access Control |
M2M | Machine to machine | M2H | Machine to human | H2H | Human to human |
DoS | Denial-of-service | DDoS | Distributed denial of service | BFA | Brute force attack |
PUF | Physical unclonable functions | PKI | Public Key Infrastructure | AES | Advanced encryption standard |
ABE | Attribute Based | MAC | Message Authentication Code | ECC | Elliptic Curve Cryptography |
RSA | Rivest–Shamir–Adleman | PoW | Proof of work | PoS | Proof-of-Stake |
Survey | Citation | Year | Objective |
---|---|---|---|
Understanding security requirements and challenges in Internet of Things | Hameed et al. [30] | 2019 | Security vulnerabilities are classified; challenges, existing solutions and open research issues are highlighted. |
Survey on blockchain for Internet of Things | Wang et al. [40] | 2019 | Blockchain data structure and consensus protocol enhancement related existing works. |
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT | Sengupta et al. [11] | 2019 | Categorize IoT attacks and countermeasures; Detailed IoT and IIoT application-specific blockchain-based solutions. |
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations | Neshenko et al. [26] | 2019 | IoT taxonomy, effects and remediation. |
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices | Meneghello et el. [35] | 2019 | The security measures used by the most prevalent IoT communication protocols, as well as their flaws. |
Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey | Rafique et al. [37] | 2020 | SDN and edge computing for limited resources computed intensive tasks. |
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security | Al-Garadi et al. [27] | 2020 | IoT security threats and solutions using machine learning and deep learning. |
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey | Sharma et al. [28] | 2020 | Threats and countermeasures comparison of existing works for Smart Mobile-Internet of Things. |
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things | Fernández-Caramés et al. [31] | 2020 | Comparison of traditional and quantum security vulnerability and impacts. |
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues | Stoyanova et al. [32] | 2020 | Discussed present challenges and solution of IoT forensics. |
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems | Chettri et al. [33] | 2020 | 5G layers, effect of 5G on IoT and review on low-power wide-area network for 5G. |
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies | Friha et al. [38] | 2021 | Emerging technology like SDN, NFV, Blockchain in the smart agriculture related application. |
A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges | Sadawi et al. [41] | 2021 | Challenges and attacks resistance using blockchain technology. |
Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive Survey | Song et al. [36] | 2021 | How IoT can be applied in smart logistics. |
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things | Alwarafy [39] | 2021 | Improvement of data processing and resistance of attacks using edge-computing. |
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey | Khan et al. [34] | 2021 | Discussed IoT architecture and lightweight cryptographic protocols. |
Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey | Khor et al. [42] | 2021 | Discuss the blockchain technology solutions and how it can be used in resource constraint devices. |
Machine Learning-Based Security Solutions for Healthcare: An Overview | Arora et al. [43] | 2022 | Healthcare security solutions using machine learning. |
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey | Barua et al. [29] | 2022 | Security threats, taxonomy and solutions for Bluetooth based attack. |
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system | Gaurav et al. [44] | 2022 | Machine learning based malware detection in the IoT network. |
This Paper | - | - | Provided overview and comparison of IoT and IoE network; Provided overview of different IoT applications; Details discussion of IoT taxonomy, effects, and countermeasures; Centralized and blockchain based existing security solutions discussion in depth of IoT applications. |
Hardware Limitation | Software Limitation | Network Limitation |
---|---|---|
Computational and energy constraint | Embedded software constraint | Mobility |
Memory constraint | Dynamic security patch | Scalability |
Tamper resistant packaging | Multiplicity of communication medium | |
Multi-Protocol Networking | ||
Dynamic network topology |
Security Requirements | Definition | Abbreviations |
---|---|---|
Confidentiality | The process in which secret and confidential of the on-air and stored information is strictly preserved and only permitted objects or users have access to it. | C |
Integrity | The process in which there is no alternation of data and accuracy is taken care of. | I |
Nonrepudiation | The procedure through which an IoT system verifies an event’s legitimacy and origin. | NR |
Availability | The process of making sure services are accessible to who needs them, even if there is a power outage or a breakdown. | A |
Privacy | The method by which an IoT system is to access private data by following rules and policies. | P |
Auditability | The process by which an IoT system monitors it actions. | AU |
Accountability | The mechanism through which IoT system users will be responsible for their actions. | AC |
Trustworthiness | The method through which an IoT system can verify an individual’s identification and establish trust in a third party. | TW |
Physical Attacks | Encryption Attacks | Network Attacks | Application Attacks |
---|---|---|---|
Node Jamming | Man In The Middle Attack | Traffic Analysis Attacks | Virus and Worms |
Physical Damage | Side Channel Attacks | RFID Spoofing | Malicious Scripts |
Node Tampering | Cryptanalysis Attacks | RFID Cloning | Spyware and Adware |
Social Engineering | RFID Unauthorized Access | Trojan Horse | |
Malicious Node Injection | Man In the Middle Attack | Denial of Service | |
Sleep Deprivation Attack | Denial of Service | Firmware Hijacking | |
Malicious Code Injection | Sinkhole Attack | Botnet Attack | |
RF Interference | Routing Information Attack | Brute Force Password Attack | |
Tag Cloning | Sybil Attack | Phishing Attacks | |
Eavesdropping | Replay Attack | ||
Tag Tampering | Hello Flood Attack | ||
Outage attack | Blackmail Attack | ||
Object replication | Blackhole Attack | ||
Hardware Trojan | Wormhole Attack | ||
Grayhole Attack |
Physical Attacks | Compromised Security Requirements | Effects | Countermeasures |
---|---|---|---|
Node Jamming | ALL | Communication disruption, Reducing lifetime [99] | Frequency hopping [100], Game theory [99], Spread Spectrum, lower duty cycle, priority messages, region mapping |
Physical Damage | ALL | Hardware control, Confidential information leakage [101] | Secure physical design, tamper proof and self-destruction |
Node Tampering | ALL | Device ID impersonation [102], Access to sensitive data and Gain access, DoS | Cloning resistance and self-destruction, lowering information leakage (adding randomized delay, deliberately generated noise, balancing hamming weights, strengthening the cache architecture, shielding), integrating Physically Unclonable Function (PUF) in the device [102] |
Social Engineering | ALL | Control sensors [103] | Cloud-edge processing and feedback [104], Back up techniques, education of IoT users, tamper proofing and self-destruction |
Malicious Node Injection | ALL | Illegal surveillance [102], Control data flow; Man in the Middle | Data compression algorithm [105], Calculation of path credibility [106], Secure firmware update, hash-based mechanisms, Encryption, authentication technique |
Sleep Deprivation Attack | I, A, NP | Node shutdown | Intrusion Detection system [63], Firefly algorithm and Hopfield neural network [107], Radial bias function [108] |
Malicious Code Injection | ALL | Loss of software integrity, Access to sensitive information and Gain access, DoS | Chain of trust, API endpoint security [102], Traffic monitoring and detection scheme [109], Tamper protection and self-destruction, IDS |
RF Interference | ALL | Message block [91], DoS | Distance-based information, Secure kill command for tags, Electronic Product Code (EPC) tags [63], spread-spectrum communication [110], Anti-jamming beamforming scheme [91] |
Tag Cloning | ALL | Unauthorized copy of tag | Attack probability scheme [111], Tag randomization [112], Encryption, hash-based methods, authentication framework, kill sleep instruction, isolation, blocking, distance estimation, Integrating PUFs into RFID tags |
Eavesdropping | C, NR, P | Extract critical network information [102] | Secure Bootstrapping [63], low-cost demilitarized zone [102], Encryption techniques, shift data to the back end |
Tag Tampering | ALL | Malicious altercation of data in tag memory [113] | Authentication watermark and recovery Watermark [114], Integration of PUFs into RFID tags, hash-based mechanisms, encryption, tamper-release layer RFID, integrating alarm option for active Tags |
Outage attack | A, AC, P, AU, NP | Disrupt or bias the state of applications [115] | Random time hopping sequence and random permutation [115], Secure physical design |
Object replication | ALL | Control network [116] | 3-D backward key chains based on deployment knowledge [117], Encryption, Hash-based methods, Lightweight cartographic schemes |
Hardware Trojan | ALL | Function change of chips and sensitive information leakage [118] | Temporal thermal information [118], Electromagnetic radiation [119], Side-channel signal assessment (based on path-delay fingerprint, based on symmetry breaking, based on thermal and power, machine learning application), trojan activation |
Encryption Attacks | Compromised Security Requirements | Effects | Countermeasures |
---|---|---|---|
Man In The Middle Attack | C, I, P, NR | Extract critical network information [102] | Encryption of the RFID communication medium, authentication techniques [96] |
Side-Channel Attacks | C, AU, NR, P | Secret key [84] | Shielding [122], Adding randomized delay [123], Randomization [124], Blocking, isolation, sleep instruction, kill command, tamper proofing and self-destruction, lowering information leakage, obfuscating methods |
Cryptanalysis Attacks | ALL | Encryption Key | Ultra-lightweight cryptography algorithm (SLIM) [125] |
Network Attacks | Compromised Security Requirements | Effects | Countermeasures |
---|---|---|---|
Traffic Analysis Attacks | P, NR | Data leakage (Network information) [126] | Anonymous Communication Scheme Based on the Proxy Source Node and the Shortest Path Routing [147], Traffic flow in different gateway [126] |
RFID Cloning | ALL | Genuine tag removal and data collision [148] | Firewalls, encryption of RFID signals, authentication to identify approved users, and shielding of RFID tags, PUF [96], Unreconcilable collision detection by multiple tags of same ID [148] |
RFID Spoofing | ALL | Data Manipulation and Modification (Read, Write, Delete) | RFID authentication protocol, Data encryption [96], Elliptic Curve Cryptography [149], |
RFID Unauthorized Access | ALL | Data manipulation [97], Data Modification (Read, Write, Delete) | Authentication, Field detectors, Shift data to the backend [96], Arbitrator over the Universal Software Radio Peripheral (USRP) platform [150], Control circuit to notify and software [151] |
Man In the Middle Attack | C, I, P, NR | Data Privacy violation, source integrity [152] | Encryption, Secure channel, Authentication protocol, Multidimensional plausibility check [132], Radio frequency fingerprint technology [153] |
Denial of Service | P, A | Network Flooding, Network Crash | One-way hash chain [154], Policies provided by providers |
Sinkhole Attack | A, C, I | Routing protocol [155], Data alteration or leakage | Watchdog scheme, pathrater scheme [156], Geographic routing protocol [155], Radial bias function [108], Attribute-based access control and trust-based behavioral tracking [157], IDS solution, parent fail-over, identity certificates, and a rank authentication scheme |
Routing Information Attacks | I, NR | Routing Loops | Authentication, localized encryption and authentication protocol (LEAP) [156], Sink-based intrusion detection system [158] |
Sybil Attack | C, I, AC, NR, P | Multi-path routing [156], Unfair resource allocation, Redundancy | Radio resource testing and random key predistribution [156], Rule-based anomaly detection system [159], ID-based public keys [160], Attribute-based access control and trust-based behavioral tracking [157], Artificial bee colony (ABC) of honey bees [139], Classification-based Sybil detection (BCSD) |
Replay Attack | ALL | Network congestion, DoS | Key agreement based on ECC, PUF, Hash etc [161], Gaussian-tag-embedded physical-layer authentication (GTEA) framework using a weighted fractional Fourier transform (WFRFT) [162], A challenge and response technique, the time-based or counter-based mechanism |
HELLO flood attack | C, I, AC, NR, P, A | Advertise fake route, Routing protocol [156], Resource consumption [163] | Link-layer metric as a feature in the determination of the default path, limit size of connections [110], Amalgamation the merits of probability-based and location-based flooding algorithms [164], Deep learning [163] |
Blackmail attack | C, I, P, NR | Isolation of legitimate device [143] | Deep learning [165], Authentication mechanism |
Blackhole attack | C, I, AC, NR, P | Drop packets [156] | Multiple routing path [110], Attribute-based access management and trust-based behavioral tracking [157], Ad-hoc on-demand distance vector (AODV) with encryption [166], Proactive reputation updating algorithm and a reputation-based probabilistic forwarding strategy [167] |
Wormhole attack | C, I, AC, NR, P | Routing protocol [155], Delete files and documents [84], Packet tunneling | packet leash [156], Markle tree authentication, binding geographic information, Geographic routing protocol [155], Increment of alternative routing path and reduce timeout duration [144] |
Grayhole attack | C, I, AC, NR, P | Packet drop [145] | Multiple routing path [110], Acknowledgment count [168], Overhear the transmission of neighbor node for failure detection framework [169], Multihop communication [145] |
Application Attacks | Compromised Security Requirements | Effects | Countermeasures |
---|---|---|---|
Virus and Worms | ALL | Resource Destruction | Machine learning techniques and signature matching techniques [186], Security updates, side-channel analysis, verify software integrity, control flow, protective Software |
Malicious Scripts | ALL | Infected Data | Algebra statistics and geometric trends [187], Firewalls |
Spyware and Adware | ALL | Resource Destruction | Installing antivirus or antimalware; API call network with the heuristic detection mechanism [188], Logging and testing [173] |
Trojan Horse | ALL | Resource Destruction | Noise bound [189], Monitoring, Audit and research device and network, place IoT devices in separate segment or virtual LAN [190] |
Denial of Service | A, AC, AU, NR, P | Network shutdown, Resource exhaustion [64] | Access Control Lists |
Firmware Hijacking | ALL | Unauthorized operation and path for other attacks [180] | Electromagnetic pattern [191], use Safe programming languages, add runtime code, audit software |
Botnet Attack | ALL | Service outage [181] | Packet monitoring and feed to Enhanced Support Vector Neural Network (ESVNN) [192], Deep learning [193], Bot program in local DNS server [181] |
Brute Force Password Attack | ALL | Sensitive data, System compromise [194] | Logging attempt and frequency [195], Dynamic password change [196], Securing firmware update, cryptography methods |
Phishing Attacks | ALL | Stage for multiple attack [197] | Machine learning [197], Artificial intelligence [198], Cryptographic methods |
Author | Year | Objective | Technique Used | Type of Data | Framework | Pros | Cons |
---|---|---|---|---|---|---|---|
Guo et al. [214] | 2017 | Solve complexity due to dynamic data | PKI | Big data | Big data left | Single sign-on | ID exposed, Fake certificate after changing RSU |
Li et al. [215] | 2019 | Remove certificate storage dependency | PKI | Vehicle data | - | Certificate-less | vulnerable to resist attack |
Kerrache et al. [218] | 2019 | To ensure trust among drivers | Chaotic map and Social Network | Social profile | TACASHI | Honesty factor | Dependent on external factor |
Meshram et al. [221] | 2021 | To secure smart city | Chaotic map | Smart city | - | Lightweight | Need to enhance security |
Al et al. [219] | 2021 | Reduce communication and key management overhead | CRSA | Throughput gain | - | Minimizes collision and Improved throughput | High storage, Keys of vehicles can be exposed |
Hwang et al. [223] | 2020 | To enable safe channel for sharing medical data | CP-ABE | Medical data | - | Safeguard issue of key abuse | Leakage of PHI file |
Han et al. [222] | 2021 | Algorithm to build frequent item sets | CP-ABE | Attributes | - | Improved speed | Limited to same attribute set |
Huang et al. [224] | 2019 | To safeguard against unauthorized entity | ECG | PHR file | - | Lightweight | Need to be anonymous |
Hahn et al. [228] | 2019 | Countermeasure against MAC-based flaws | MAC | Health data | - | Less verification time | Server impersonation |
Siddiqi et al. [227] | 2020 | To build feasible and secure IoMT communication | MAC | Medical data | IMDfence | Less energy consumption | Need to ensure anonymity |
Wazid et al. [229] | 2019 | Secure wireless communication | ECC | Surrounding information | AKM-IoV | Dynamic node addition | Does not resist DoS attack |
Wu et al. [230] | 2020 | Reduce the verification delay and achieve fast message verification | ECC | Batch message | - | Batch verification | Need focus on security |
Thumbur et al. [231] | 2021 | Avoid complex certificate management problem and key escrow problem | ECC | Signature | Aggregate Signature | Low verification time and storage at RSU | DoS attack |
Zhang et al. [232] | 2020 | Secure communication with limited bandwidth | ECC | Signature | - | Random number to avoid side-channel attack | Need RSU and TA secure communication |
Ghahramani et al. [233] | 2020 | Support roaming users in global mobility network | ECC | Mobile users data | - | Added deep learning to verify biometric | High storage and communication cost |
Xie et al. [235] | 2021 | To protect wireless sensor networks in smart city | ECC | Wireless sensor | - | Simple | Smart card stolen attack |
Xia et al. [237] | 2021 | To secure environment of smart grid | ECC | Smart meter | - | Completed in two steps | Smart meter capture attack |
Chen et al. [238] | 2021 | To get data from edge nodes | ECC | Edge utility nodes | - | XOR and Hashed computation | Did not consider the whole network |
Srinivas et al. [239] | 2021 | Secure big data collection in smart transportation | ECC | Vehicle data | - | Security | Computational, communication cost |
Sharma et al. [243] | 2021 | Correctness of data exchange | Supervised machine learning | Location and movement | - | Detect attack and countermeasure | Limited to position based attack |
Pascale et al. [244] | 2021 | Detection of a possible cyber-attack | Machine learning | Parameters as RPM | - | Accuracy | Not focused on data transmission |
Pradeep et al. [245] | 2022 | Secure smart city applications | CHAP PPP | Operational data of city | - | Simple calculations | System verification is absent |
Wang et al. [246] | 2018 | Physical and external security | PUF | Vehicle data | NOTSA | OBU with segregated applications | Need secure area in OBU |
Yanambaka et al. [250] | 2019 | To develop secure IoMT system | PUF | Health data | PMSec | Simple and lightweight | ML attack, MITM attack |
Alladi et al. [247] | 2021 | Verification of ECU firmware | PUF and ECC | Firmware and software | - | Physical safety | Insider can identify secret key |
Aman et al. [248] | 2021 | Resist physical attacks and reduce overhead with secure communication | PUF | Network traffic | - | Low authentication packets and overhead | CRP updates can expose system |
Alladi et al. [249] | 2021 | Sensitive information transfer and resist node capture/tampering attack | PUF | Traffic information | SecAuthUAV | Low energy in device and low storage in server | Could server impersonation and ID expose |
Badar et al. [251] | 2021 | Securing smart grid | PUF | Line flaw or breakage | - | Computational cost is low | Communication cost is high |
Tanveer et al. [252] | 2021 | To make reliable smart grids | PUF and ECC | Power usages | ARAP-SG | Computational cost is less | Unnecessary storage and computation |
Jiang et al. [254] | 2019 | Application of blockchain in IoV | Blockchain | Big data | - | Showed IoV using Blockchain | Security will be in future work |
Liu et al. [255] | 2019 | Reduce transaction confirmation delay and clod-start of new users | Blockchain (PoW) | Traffic information | - | Pricing strategy | Not suitable for high resource adversary |
Yin et al. [256] | 2020 | Reduce processing time with gainig profit | Blockchain | Mobile crowdsensing | - | Time-window based urgent task | Reactive security |
Yang et al. [257] | 2019 | Trust management in vehicular network | Blockchain (PoW and PoS) | Traffic | - | Credible neighbor rating | Reply attack, MITM attack etc, overhead |
Gao et al. [258] | 2020 | Effective network management | Blockchain | Vehicular data | SDN | Avoid frequent handover and relieve pressure | No focus on data transmission trust |
Xu et al. [259] | 2021 | Energy efficiency and encounter external invasion | Blockchain | Vehicular data | - | Suitable for high amount of data | basic security |
Javaid et al. [260] | 2020 | Trust establishment | Blockchain (dPoW) and PUF | Traffic | - | No physical and side-channel attack | Can expose response |
Vivekanandan et al. [261] | 2021 | Secure device to device communication in smart city | Blockchain and ECC | Devices data | BIDAPSCA5G | Location incorporation | Eavesdropping attack |
Wang et al. [262] | 2022 | To build a reliable communication channel for healthcare | Blockchain (PoW) and PUF | Health information | - | Low cost | Storage cost |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Internet of Things: Security and Solutions Survey. Sensors 2022, 22, 7433. https://doi.org/10.3390/s22197433
Sadhu PK, Yanambaka VP, Abdelgawad A. Internet of Things: Security and Solutions Survey. Sensors. 2022; 22(19):7433. https://doi.org/10.3390/s22197433
Chicago/Turabian StyleSadhu, Pintu Kumar, Venkata P. Yanambaka, and Ahmed Abdelgawad. 2022. "Internet of Things: Security and Solutions Survey" Sensors 22, no. 19: 7433. https://doi.org/10.3390/s22197433
APA StyleSadhu, P. K., Yanambaka, V. P., & Abdelgawad, A. (2022). Internet of Things: Security and Solutions Survey. Sensors, 22(19), 7433. https://doi.org/10.3390/s22197433