TY - JOUR
T1 - A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things
AU - Khanam, Shapla
AU - Ahmedy, Ismail Bin
AU - Idna Idris, Mohd Yamani
AU - Jaward, Mohamed Hisham
AU - Bin Md Sabri, Aznul Qalid
N1 - Publisher Copyright:
© 2013 IEEE.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2020
Y1 - 2020
N2 - Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, the extensive demand for IoT and its various applications has continued to grow, coupled with the need to achieve foolproof security requirements. IoT produces a vast amount of data under several constraints such as low processor, power, and memory. These constraints, along with the invaluable data produced by IoT devices, make IoT vulnerable to various security attacks. This paper presents an overview of IoT, its well-known system architecture, enabling technologies, and discusses security challenges and goals. Furthermore, we analyze security vulnerabilities and provide state-of-the-art security taxonomy. The taxonomy of the most relevant and current IoT security attacks is presented for application, network, and physical layers. While most other surveys studied one of the areas of security measures, this study considers and reports on the most advanced security countermeasures within the areas of autonomic, encryption, and learning-based approaches. Additionally, we uncover security challenges that may be met by the research community regarding security implementation in heterogeneous IoT environment. Finally, we provide different visions about possible security solutions and future research directions.
AB - Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, the extensive demand for IoT and its various applications has continued to grow, coupled with the need to achieve foolproof security requirements. IoT produces a vast amount of data under several constraints such as low processor, power, and memory. These constraints, along with the invaluable data produced by IoT devices, make IoT vulnerable to various security attacks. This paper presents an overview of IoT, its well-known system architecture, enabling technologies, and discusses security challenges and goals. Furthermore, we analyze security vulnerabilities and provide state-of-the-art security taxonomy. The taxonomy of the most relevant and current IoT security attacks is presented for application, network, and physical layers. While most other surveys studied one of the areas of security measures, this study considers and reports on the most advanced security countermeasures within the areas of autonomic, encryption, and learning-based approaches. Additionally, we uncover security challenges that may be met by the research community regarding security implementation in heterogeneous IoT environment. Finally, we provide different visions about possible security solutions and future research directions.
KW - Attacks
KW - countermeasures
KW - encryption
KW - Internet of Things
KW - IoT architecture
KW - learning-based algorithm
KW - privacy
KW - secure communications
KW - security
KW - taxonomy
UR - http://www.scopus.com/inward/record.url?scp=85097944528&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2020.3037359
DO - 10.1109/ACCESS.2020.3037359
M3 - Article
AN - SCOPUS:85097944528
SN - 2169-3536
VL - 8
SP - 219709
EP - 219743
JO - IEEE Access
JF - IEEE Access
ER -