Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Computers  /  Vol: 9 Par: 2 (2020)  /  Artículo
ARTÍCULO
TITULO

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

Muath A. Obaidat    
Suhaib Obeidat    
Jennifer Holst    
Abdullah Al Hayajneh and Joseph Brown    

Resumen

The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem.

 Artículos similares

       
 
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os... ver más
Revista: Applied Sciences

 
Jiahang Chen, Jan Reitz, Rebecca Richstein, Kai-Uwe Schröder and Jürgen Roßmann    
Advancing digitalization is reaching the realm of lightweight construction and structural?mechanical components. Through the synergistic combination of distributed sensors and intelligent evaluation algorithms, traditional structures evolve into smart se... ver más
Revista: Information

 
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari    
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c... ver más
Revista: Information

 
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information

 
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information