Security and Privacy of Internet of Things: A Review of Challenges and Solutions

Authors

  • Yujing Lu Shijiazhuang University of Applied Technology, Shijiazhuang, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1261

Keywords:

Internet of Things, Security, Future development, Review

Abstract

The Internet of Things (IoT) is a global and comprehensive network that monitors and controls the physical world by collecting, processing, and analysing data derived from IoT devices. Globally, the IoT is emerging as a trend bringing intelligence and automation to a variety of application domains, presenting both opportunities and security challenges. It is used in various fields, including medical care, smart grids, home automation, smart cities, etc. As the number of devices connected to the IoT increases, there is an increased risk of cyber-attacks, data breaches, and other malicious activities. This means that it is essential to have secure protocols and encryption methods in place to protect the data being exchanged. This paper identifies and synthesizes security issues related to the IoT. Security threats across different layers of the IoT architecture are discussed first, followed by identifying prevalent security and privacy issues. A discussion is also provided on security countermeasures.

Downloads

Download data is not yet available.

Author Biography

Yujing Lu, Shijiazhuang University of Applied Technology, Shijiazhuang, China

Yujing Lu graduated from Hebei Normal University with a master’s degree in software engineering in 2016. Presided over three department level projects, one municipal education reform project and one school level project, one of which won the third prize of Hebei human resources and social security research project. Published two papers. Her research interests include artificial intelligence, network security and intrusion detection.

References

B. Pourghebleh, N. Hekmati, Z. Davoudnia, and M. Sadeghi, “A roadmap towards energy-efficient data fusion methods in the Internet of Things,” Concurrency and Computation: Practice and Experience, p. e6959, 2022.

B. Pourghebleh, A. A. Anvigh, A. R. Ramtin, and B. Mohammadi, “The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments,” Cluster Computing, pp. 1–24, 2021.

C. Han and X. Fu, “Challenge and Opportunity: Deep Learning-Based Stock Price Prediction by Using Bi-Directional LSTM Model,” Frontiers in Business, Economics and Management, vol. 8, no. 2, pp. 51–54, 2023.

M. Shahin et al., “Cluster-based association rule mining for an intersection accident dataset,” in 2021 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), 2021: IEEE, pp. 1–6.

B. M. Jafari, M. Zhao, and A. Jafari, “Rumi: An Intelligent Agent Enhancing Learning Management Systems Using Machine Learning Techniques,” Journal of Software Engineering and Applications, vol. 15, no. 9, pp. 325–343, 2022.

S. Yumusak, S. Layazali, K. Oztoprak, and R. Hassanpour, “Low-diameter topic-based pub/sub overlay network construction with minimum–maximum node degree,” PeerJ Computer Science, vol. 7, p. e538, 2021.

R. N. Jacob, “Non-performing Asset Analysis Using Machine Learning,” in ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1, 2021: Springer, pp. 11–18.

S. Meisami, M. Beheshti-Atashgah, and M. R. Aref, “Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare,” arXiv preprint arXiv:2109.14812, 2021.

H. Seraji, R. Tavakkoli-Moghaddam, S. Asian, and H. Kaur, “An integrative location-allocation model for humanitarian logistics with distributive injustice and dissatisfaction under uncertainty,” Annals of Operations Research, vol. 319, no. 1, pp. 211–257, 2022.

M. Sadi et al., “Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware,” in 2022 IEEE 40th VLSI Test Symposium (VTS), 2022: IEEE, pp. 1–12.

M. Sarbaz, M. Manthouri, and I. Zamani, “Rough neural network and adaptive feedback linearization control based on Lyapunov function,” in 2021 7th International Conference on Control, Instrumentation and Automation (ICCIA), 2021: IEEE, pp. 1–5.

H. Kosarirad, M. Ghasempour Nejati, A. Saffari, M. Khishe, and M. Mohammadi, “Feature Selection and Training Multilayer Perceptron Neural Networks Using Grasshopper Optimization Algorithm for Design Optimal Classifier of Big Data Sonar,” Journal of Sensors, vol. 2022, 2022.

S. Ahmad, S. Umirzakova, F. Jamil, and T. K. Whangbo, “Internet-of-things-enabled serious games: A comprehensive survey,” Future Generation Computer Systems, 2022.

B. Pourghebleh, K. Wakil, and N. J. Navimipour, “A comprehensive study on the trust management techniques in the Internet of Things,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9326–9337, 2019.

K. Cao et al., “Enhancing physical layer security for IoT with non-orthogonal multiple access assisted semi-grant-free transmission,” IEEE Internet of Things Journal, 2022.

V. Hayyolalam, B. Pourghebleh, and A. A. Pourhaji Kazem, “Trust management of services (TMoS): Investigating the current mechanisms,” Transactions on Emerging Telecommunications Technologies, vol. 31, no. 10, p. e4063, 2020.

B. Pourghebleh and N. J. Navimipour, “Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research,” Journal of Network and Computer Applications, vol. 97, pp. 23–34, 2017.

B. Pourghebleh and V. Hayyolalam, “A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things,” Cluster Computing, pp. 1–21, 2019.

B. Pourghebleh, V. Hayyolalam, and A. A. Anvigh, “Service discovery in the Internet of Things: review of current trends and research challenges,” Wireless Networks, vol. 26, no. 7, pp. 5371–5391, 2020.

S. Ammirato, F. Sofo, A. M. Felicetti, and C. Raso, “A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context,” European Journal of Innovation Management, 2018.

E. S. M. Nordin, H. Abas, and A. Azizan, “Modelling IoT Security Risk Management in Banking Environment,” Open International Journal of Informatics, vol. 8, no. 1, pp. 10–20, 2020.

R. E. Hiromoto, M. Haney, and A. Vakanski, “A secure architecture for IoT with supply chain risk management,” in 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2017, vol. 1: IEEE, pp. 431–435.

T. Omitola and G. Wills, “Towards mapping the security challenges of the Internet of Things (IoT) supply chain,” Procedia Computer Science, vol. 126, pp. 441–450, 2018.

W. Zhou and S. Piramuthu, “IoT security perspective of a flexible healthcare supply chain,” Information Technology and Management, vol. 19, no. 3, pp. 141–153, 2018.

L. Nandakumar, “Privacy-Aware State Estimation based on Obfuscated Transformation and Differential Privacy: With applications to smart grids and supply chain economics,” 2018.

M. J. Farooq and Q. Zhu, “IoT supply chain security: overview, challenges, and the road ahead,” arXiv preprint arXiv:1908.07828, 2019.

A. Shahzad, K. Zhang, and A. Gherbi, “Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive blockchain,” Sensors, vol. 20, no. 13, p. 3760, 2020.

D. Guo, “Internet of Things Based Network Security for Supply Chain Management in the Business Environment,” Wireless Personal Communications, pp. 1–22, 2021.

V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, “Network-level security and privacy control for smart-home IoT devices,” in 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), 2015: IEEE, pp. 163–167.

F. K. Santoso and N. C. Vun, “Securing IoT for smart home system,” in 2015 international symposium on consumer electronics (ISCE), 2015: IEEE, pp. 1–2.

P. Gupta and J. Chhabra, “IoT based Smart Home design using power and security management,” in 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), 2016: IEEE, pp. 6–10.

H. Lin and N. W. Bergmann, “IoT privacy and security challenges for smart home environments,” Information, vol. 7, no. 3, p. 44, 2016.

A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” in 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), 2017: IEEE, pp. 618–623.

W. Ali, G. Dustgeer, M. Awais, and M. A. Shah, “IoT based smart home: Security challenges, security requirements and solutions,” in 2017 23rd International Conference on Automation and Computing (ICAC), 2017: IEEE, pp. 1–6.

D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, “Security and privacy issues for an IoT based smart home,” in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017: IEEE, pp. 1292–1297.

S. Marksteiner, V. J. E. Jiménez, H. Valiant, and H. Zeiner, “An overview of wireless IoT protocol security in the smart home domain,” 2017 Internet of Things Business Models, Users, and Networks, pp. 1–8, 2017.

D. Bastos, M. Shackleton, and F. El-Moussa, “Internet of things: A survey of technologies and security risks in smart home and city environments,” 2018.

Z. Shouran, A. Ashari, and T. Priyambodo, “Internet of things (IoT) of smart home: privacy and security,” International Journal of Computer Applications, vol. 182, no. 39, pp. 3–8, 2019.

T. Baranwal and P. K. Pateriya, “Development of IoT based smart security and monitoring devices for agriculture,” in 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence), 2016: IEEE, pp. 597–602.

B. Keerthana, P. Nivetha, M. Boomika, M. Mathivathani, and A. Niranjana, “IoT based smart security and monitoring devices for agriculture,” Int. J. Inf. Res. Rev, vol. 5, no. 04, pp. 5415–5419, 2018.

L. S. Shabadi and H. B. Biradar, “Design and implementation of IOT based smart security and monitoring for connected smart farming,” International Journal of Computer Applications, vol. 975, no. 8887, 2018.

V. Nithin, S. Mishra, P. Devarubiny, and S. Muthulakshmi, “IoT enabled farming assist and security using machine learning,” ed: Asian Research Publishing Network Journal of Engineering and Applied Sciences, 2019.

T. Gundu and V. Maronga, “IoT Security and Privacy: Turning on the Human Firewall in Smart Farming,” ICICIS, pp. 95–104, 2019.

K. Demestichas, N. Peppes, and T. Alexakis, “Survey on security threats in agricultural IoT and smart farming,” Sensors, vol. 20, no. 22, p. 6458, 2020.

M. A. Ferrag, L. Shu, X. Yang, A. Derhab, and L. Maglaras, “Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges,” IEEE access, vol. 8, pp. 32031–32053, 2020.

A. Vangala, A. K. Das, N. Kumar, and M. Alazab, “Smart secure sensing for IoT-based agriculture: Blockchain perspective,” IEEE Sensors Journal, vol. 21, no. 16, pp. 17591–17607, 2020.

H. N. Saha, R. Roy, M. Chakraborty, and C. Sarkar, “Development of IoT-based smart security and monitoring devices for agriculture,” Agricultural informatics: automation using the IoT and machine learning, pp. 147–169, 2021.

G. J. Rosline, P. Rani, and D. Gnana Rajesh, “Comprehensive Analysis on Security Threats Prevalent in IoT-Based Smart Farming Systems,” in Ubiquitous Intelligent Systems: Springer, 2022, pp. 185–194.

S. Sharma and P. Mittal, “IoT-Based Smart Security System for Agriculture Fields,” in Cyber Security and Digital Forensics: Springer, 2022, pp. 143–151.

M. Sherburne, R. Marchany, and J. Tront, “Implementing moving target ipv6 defense to secure 6lowpan in the internet of things and smart grid,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 37–40.

C. Bekara, “Security issues and challenges for the IoT-based smart grid,” Procedia Computer Science, vol. 34, pp. 532–537, 2014.

W.-L. Chin, W. Li, and H.-H. Chen, “Energy big data security threats in IoT-based smart grid communications,” IEEE Communications Magazine, vol. 55, no. 10, pp. 70–75, 2017.

Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, “Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1934–1944, 2017.

K. Kimani, V. Oduol, and K. Langat, “Cyber security challenges for IoT-based smart grid networks,” International Journal of Critical Infrastructure Protection, vol. 25, pp. 36–49, 2019.

J. Sakhnini, H. Karimipour, A. Dehghantanha, R. M. Parizi, and G. Srivastava, “Security aspects of Internet of Things aided smart grids: A bibliometric survey,” Internet of things, vol. 14, p. 100111, 2021.

R. Borgaonkar, I. Anne Tøndel, M. Zenebe Degefa, and M. Gilje Jaatun, “Improving smart grid security through 5G enabled IoT and edge computing,” Concurrency and Computation: Practice and Experience, vol. 33, no. 18, p. e6466, 2021.

A. Saleem et al., “FESDA: Fog-enabled secure data aggregation in smart grid IoT network,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6132–6142, 2019.

J.-M. Bohli, A. Skarmeta, M. V. Moreno, D. García, and P. Langendörfer, “SMARTIE project: Secure IoT data management for smart cities,” in 2015 International Conference on Recent Advances in Internet of Things (RIoT), 2015: IEEE, pp. 1–6.

A. W. Burange and H. D. Misalkar, “Review of Internet of Things in development of smart cities with data management & privacy,” in 2015 International Conference on Advances in Computer Engineering and Applications, 2015: IEEE, pp. 189–195.

W. Li, H. Song, and F. Zeng, “Policy-based secure and trustworthy sensing for internet of things in smart cities,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 716–723, 2017.

S. Latif and N. A. Zafar, “A survey of security and privacy issues in IoT for smart cities,” in 2017 Fifth International Conference on Aerospace Science & Engineering (ICASE), 2017: IEEE, pp. 1–5.

N. Magaia, R. Fonseca, K. Muhammad, A. H. F. N. Segundo, A. V. L. Neto, and V. H. C. de Albuquerque, “Industrial internet-of-things security enhanced with deep learning approaches for smart cities,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6393–6405, 2020.

C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, “IoT solution for smart cities’ pollution monitoring and the security challenges,” Sensors, vol. 19, no. 15, p. 3401, 2019.

M. Shen, X. Tang, L. Zhu, X. Du, and M. Guizani, “Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 7702–7712, 2019.

F. Al-Turjman and J. P. Lemayian, “Intelligence, security, and vehicular sensor networks in internet of things (IoT)-enabled smart-cities: An overview,” Computers & Electrical Engineering, vol. 87, p. 106776, 2020.

S. Chakrabarty and D. W. Engels, “Secure smart cities framework using IoT and AI,” in 2020 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), 2020: IEEE, pp. 1–6.

Z. Lv, L. Qiao, A. Kumar Singh, and Q. Wang, “AI-empowered IoT security for smart cities,” ACM Transactions on Internet Technology, vol. 21, no. 4, pp. 1–21, 2021.

D. Janeera, S. Gnanamalar, K. Ramya, and A. Kumar, “Internet of things and artificial intelligence-enabled secure autonomous vehicles for smart cities,” in Automotive Embedded Systems: Springer, 2021, pp. 201–218.

K.-Y. Lam, S. Mitra, F. Gondesen, and X. Yi, “ANT-centric IoT security reference architecture—Security-by-design for satellite-enabled smart cities,” IEEE Internet of Things Journal, vol. 9, no. 8, pp. 5895–5908, 2021.

V. P. Yanambaka, S. P. Mohanty, and E. Kougianos, “Making use of semiconductor manufacturing process variations: FinFET-based physical unclonable functions for efficient security integration in the IoT,” Analog integrated circuits and signal processing, vol. 93, no. 3, pp. 429–441, 2017.

C. Toma and M. Popa, “IoT security approaches in oil & gas solution industry 4.0,” Informatica Economica, vol. 22, no. 3, pp. 46–61, 2018.

Z. Shahbazi and Y.-C. Byun, “Integration of Blockchain, IoT and machine learning for multistage quality control and enhancing security in smart manufacturing,” Sensors, vol. 21, no. 4, p. 1467, 2021.

J. R. Reidenberg and F. Schaub, “Achieving big data privacy in education,” Theory and Research in Education, vol. 16, no. 3, pp. 263–279, 2018.

S. M. T. Toapanta, J. M. V. López, R. S. T. Soledispa, and L. E. M. Gallegos, “Definition of a security prototype for IoT applied to higher education,” in 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4), 2019: IEEE, pp. 115–120.

A. Badshah, A. Ghani, M. A. Qureshi, and S. Shamshirband, “Smart security framework for educational institutions using internet of things (IoT),” Comput. Mater. Contin, vol. 61, no. 1, pp. 81–101, 2019.

K. M. Jones et al., ““We’re being tracked at all times”: Student perspectives of their privacy in relation to learning analytics in higher education,” Journal of the Association for Information Science and Technology, vol. 71, no. 9, pp. 1044–1059, 2020.

L. A. Alexei and A. Alexei, “Analysis of IoT security issues used in Higher Education Institutions,” International Journal Of Mathematics And Computer Research, no. 5, pp. 2277–2286, 2021.

M. A. Canbaz, K. OHearon, M. McKee, and M. N. Hossain, “IoT Privacy and Security in Teaching Institutions: Inside The Classroom and Beyond,” in 2021 ASEE Virtual Annual Conference Content Access, 2021.

J. S. Owlett, K. A. R. Richards, S. R. Wilson, J. DeFreese, and F. Roberts, “Privacy management in the military family during deployment: Adolescents’ perspectives,” Journal of family communication, vol. 15, no. 2, pp. 141–158, 2015.

J. Chudzikiewicz, J. Furtak, and Z. Zielinski, “Secure protocol for wireless communication within internet of military things,” in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015: IEEE, pp. 508–513.

K. Wrona, “Securing the Internet of Things a military perspective,” in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015: IEEE, pp. 502–507.

J. Furtak, Z. Zieliñski, and J. Chudzikiewicz, “Security techniques for the WSN link layer within military IoT,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016: IEEE, pp. 233–238.

Z. Zieliski, J. Chudzikiewicz, and J. Furtak, “An approach to integrating security and fault tolerance mechanisms into the military IoT,” in Security and fault tolerance in Internet of Things: Springer, 2019, pp. 111–128.

M. S. Arafath, K. U. R. Khan, and K. Sunitha, “Incorporating privacy and security in military application based on opportunistic sensor network,” International Journal of Internet Technology and Secured Transactions, vol. 7, no. 4, pp. 295–316, 2017.

A. R. Sfar, Z. Chtourou, and Y. Challal, “A systemic and cognitive vision for IoT security: a case study of military live simulation and security challenges,” in 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C), 2017: IEEE, pp. 101–105.

S. Cha, S. Baek, S. Kang, and S. Kim, “Security evaluation framework for military IoT devices,” Security and Communication Networks, vol. 2018, 2018.

B. E. Katalin, “Possibilities and Security Challenges of Using IoT For Military Purposes,” Hadmérnök, vol. 13, no. 3, pp. 378–390, 2018.

M. Pradhan and J. Noll, “Security, privacy, and dependability evaluation in verification and validation life cycles for military IoT systems,” IEEE Communications Magazine, vol. 58, no. 8, pp. 14–20, 2020.

W. Labda, N. Mehandjiev, and P. Sampaio, “Modeling of privacy-aware business processes in BPMN to protect personal data,” in Proceedings of the 29th Annual ACM Symposium on Applied Computing, 2014, pp. 1399–1405.

V. Kharchenko, M. Kolisnyk, I. Piskachova, and N. Bardis, “Reliability and security issues for IoT-based smart business center: architecture and Markov model,” in 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), 2016: IEEE, pp. 313–318.

V. Diamantopoulou, N. Argyropoulos, C. Kalloniatis, and S. Gritzalis, “Supporting the design of privacy-aware business processes via privacy process patterns,” in 2017 11th International Conference on Research Challenges in Information Science (RCIS), 2017: IEEE, pp. 187–198.

K. G. Chandrashekhar, F. Karimi-Alaghehband, and D. Özgün, “IoT Security Adoption into Business Processes: A Socio-Technical View,” 2017.

A. Bujari, M. Furini, F. Mandreoli, R. Martoglia, M. Montangero, and D. Ronzani, “Standards, security and business models: key challenges for the IoT scenario,” Mobile Networks and Applications, vol. 23, no. 1, pp. 147–154, 2018.

H. E. Yılmaz, A. Sirel, and M. F. Esen, “The impact of internet of things self-security on daily business and business continuity,” in Research Anthology on Business Continuity and Navigating Times of Crisis: IGI Global, 2022, pp. 695–712.

J. Pacheco, S. Satam, S. Hariri, C. Grijalva, and H. Berkenbrock, “IoT Security Development Framework for building trustworthy Smart car services,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016: IEEE, pp. 237–242.

S. Wang, Y. Hou, F. Gao, and X. Ji, “A novel IoT access architecture for vehicle monitoring system,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016: IEEE, pp. 639–642.

D. Mukhopadhyay, M. Gupta, T. Attar, P. Chavan, and V. Patel, “An attempt to develop an IOT based vehicle security system,” in 2018 IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS), 2018: IEEE, pp. 195–198.

B. Girish, A. D. Gowda, H. Amreen, and K. A. Singh, “IOT based security system for smart vehicle,” International Research Journal of Engineering and Technology (IRJET), vol. 5, no. 5, pp. 2869–2874, 2018.

I. García-Magariño, S. Sendra, R. Lacuesta, and J. Lloret, “Security in vehicles with IoT by prioritization rules, vehicle certificates, and trust management,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 5927–5934, 2018.

A. R. Sfar, Y. Challal, P. Moyal, and E. Natalizio, “A game theoretic approach for privacy preserving model in IoT-based transportation,” IEEE Transactions on Intelligent Transportation Systems, vol. 20, no. 12, pp. 4405–4414, 2019.

M. M. Hussain, M. S. Alam, M. S. Beg, and R. Ali, “Searching for IoT Resources in Intelligent Transportation Cyberspace (T-CPS)—Requirements, Use-Cases and Security Aspects,” in Cybersecurity and Privacy in Cyber-Physical Systems: CRC Press, 2019, pp. 293–331.

A. Lei, Y. Cao, S. Bao, P. Asuquom, H. Cruickshank, and Z. Sun, “Blockchain-based dynamic key management for IoT-transportation security protection,” Blockchain for Distributed Systems Security, p. 117, 2019.

N. Vinayaga-Sureshkanth, R. Wijewickrama, A. Maiti, and M. Jadliwala, “Security and privacy challenges in upcoming intelligent urban micromobility transportation systems,” in Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020, pp. 31–35.

J. Zhang, Y. Wang, S. Li, and S. Shi, “An architecture for IoT-enabled smart transportation security system: a geospatial approach,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6205–6213, 2020.

W. Priharti, S. Sumaryo, T. Saraswati, and M. Nurfadilah, “IoT based logistics vehicle security monitoring system,” in IOP Conference Series: Materials Science and Engineering, 2020, vol. 771, no. 1: IOP Publishing, p. 012012.

M. Hammoudeh et al., “A service-oriented approach for sensing in the Internet of Things: intelligent transportation systems and privacy use cases,” IEEE Sensors Journal, vol. 21, no. 14, pp. 15753–15761, 2020.

K. Abbas et al., “Convergence of blockchain and IoT for secure transportation systems in smart cities,” Security and Communication Networks, vol. 2021, 2021.

A. Masood and A. Gupta, “Enhanced Logistics Security Techniques Using IoT and 5G,” in 2020 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), 2020: IEEE, pp. 7–14.

I. Sergi, T. Montanaro, F. L. Benvenuto, and L. Patrono, “A smart and secure logistics system based on IoT and cloud technologies,” Sensors, vol. 21, no. 6, p. 2231, 2021.

Y. Abbassi and H. Benlahmer, “IoT and Blockchain combined: for decentralized security,” Procedia Computer Science, vol. 191, pp. 337–342, 2021.

A. J. J. Valera, M. A. Zamora, and A. F. Skarmeta, “An architecture based on internet of things to support mobility and security in medical environments,” in 2010 7th IEEE consumer communications and networking conference, 2010: IEEE, pp. 1–5.

L. M. R. Tarouco et al., “Internet of Things in healthcare: Interoperatibility and security issues,” in 2012 IEEE international conference on communications (ICC), 2012: IEEE, pp. 6121–6125.

A. Rghioui, A. L’aarje, F. Elouaai, and M. Bouhorma, “The internet of things for healthcare monitoring: security review and proposed solution,” in 2014 Third IEEE international colloquium in information science and technology (CIST), 2014: IEEE, pp. 384–389.

J. T. Kim, “Privacy and security issues for healthcare system with embedded rfid system on internet of things,” Advanced Science and Technology Letters, vol. 72, pp. 109–112, 2014.

S.-h. Woo, “Medical Information Security and Standard Technology On IoT Environment,” Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 11, pp. 2683–2688, 2015.

T. Gong, H. Huang, P. Li, K. Zhang, and H. Jiang, “A medical healthcare system for privacy protection based on IoT,” in 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), 2015: IEEE, pp. 217–222.

E. Al Alkeem, C. Y. Yeun, and M. J. Zemerly, “Security and privacy framework for ubiquitous healthcare IoT devices,” in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015: IEEE, pp. 70–75.

U. Computing, “Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/ PICOM),” in 2015 IEEE International Conference on. IEEE, 2015.

P. A. Williams and V. McCauley, “Always connected: The security challenges of the healthcare Internet of Things,” in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016: IEEE, pp. 30–35.

K.-H. Han and W.-S. Bae, “Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices,” Cluster Computing, vol. 19, no. 4, pp. 2335–2341, 2016.

N. S. Abouzakhar, A. Jones, and O. Angelopoulou, “Internet of things security: A review of risks and threats to healthcare sector,” in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017: IEEE, pp. 373–378.

P. A. Wortman, F. Tehranipoor, N. Karimian, and J. A. Chandy, “Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain,” in 2017 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), 2017: IEEE, pp. 185–188.

D. Minoli, K. Sohraby, and B. Occhiogrosso, “Iot security (IoTsec) mechanisms for e-health and ambient assisted living applications,” in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017: IEEE, pp. 13–18.

C.-T. Li, T.-Y. Wu, C.-L. Chen, C.-C. Lee, and C.-M. Chen, “An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system,” Sensors, vol. 17, no. 7, p. 1482, 2017.

S. Alromaihi, W. Elmedany, and C. Balakrishna, “Cyber security challenges of deploying IoT in smart cities for healthcare applications,” in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2018: IEEE, pp. 140–145.

Y. Winnie, E. Umamaheswari, and D. Ajay, “Enhancing data security in IoT healthcare services using fog computing,” in 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018: IEEE, pp. 200–205.

V. Alagar, A. Alsaig, O. Ormandjiva, and K. Wan, “Context-based security and privacy for healthcare IoT,” in 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018: IEEE, pp. 122–128.

K. Fan, W. Jiang, H. Li, and Y. Yang, “Lightweight RFID protocol for medical privacy protection in IoT,” IEEE Transactions on Industrial Informatics, vol. 14, no. 4, pp. 1656–1665, 2018.

W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, “Security and privacy in the medical internet of things: a review,” Security and Communication Networks, vol. 2018, 2018.

T. Hayakawa, R. Sasaki, H. Hayashi, Y. Takahashi, T. Kaneko, and T. Okubo, “Proposal and application of security/safety evaluation method for medical device system that includes IoT,” in Proceedings of the 2018 VII International Conference on Network, Communication and Computing, 2018, pp. 157–164.

J. B. Martinez, “Medical device security in the IoT age,” in 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2018: IEEE, pp. 128–134.

A. Yeole, D. Kalbande, and A. Sharma, “Security of 6LoWPAN IoT networks in hospitals for medical data exchange,” Procedia Computer Science, vol. 152, pp. 212–221, 2019.

C. Bradley, S. El-Tawab, and M. H. Heydari, “Security analysis of an IoT system used for indoor localization in healthcare facilities,” in 2018 Systems and Information Engineering Design Symposium (SIEDS), 2018: IEEE, pp. 147–152.

S. Pirbhulal, N. Pombo, V. Felizardo, N. Garcia, A. H. Sodhro, and S. C. Mukhopadhyay, “Towards machine learning enabled security framework for IoT-based healthcare,” in 2019 13th International Conference on Sensing Technology (ICST), 2019: IEEE, pp. 1–6.

G. Srivastava, J. Crichigno, and S. Dhar, “A light and secure healthcare blockchain for iot medical devices,” in 2019 IEEE Canadian conference of electrical and computer engineering (CCECE), 2019: IEEE, pp. 1–5.

E. Fazeldehkordi, O. Owe, and J. Noll, “Security and privacy in IoT systems: a case study of healthcare products,” in 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), 2019: IEEE, pp. 1–8.

X. C. Yin, Z. G. Liu, B. Ndibanje, L. Nkenyereye, and S. Riazul Islam, “An IoT-based anonymous function for security and privacy in healthcare sensor networks,” Sensors, vol. 19, no. 14, p. 3146, 2019.

F. I. Salih, N. A. A. Bakar, N. H. Hassan, F. Yahya, N. Kama, and J. Shah, “IOT security risk management model for healthcare industry,” Malaysian Journal of Computer Science, pp. 131–144, 2019.

G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou, and C. Tsatsoulis, “Review of security and privacy for the Internet of Medical Things (IoMT),” in 2019 15th international conference on distributed computing in sensor systems (DCOSS), 2019: IEEE, pp. 457–464.

B. D. Deebak, F. Al-Turjman, M. Aloqaily, and O. Alfandi, “An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT,” IEEE Access, vol. 7, pp. 135632–135649, 2019.

R. Somasundaram and M. Thirugnanam, “Review of security challenges in healthcare internet of things,” Wireless Networks, vol. 27, no. 8, pp. 5503–5509, 2021.

A. Rahman, M. S. Hossain, N. A. Alrajeh, and F. Alsolami, “Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9603–9610, 2020.

M. Wazid, B. Bera, A. Mitra, A. K. Das, and R. Ali, “Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services,” in Proceedings of the 2nd ACM MobiCom workshop on drone assisted wireless communications for 5G and beyond, 2020, pp. 37–42.

M. Amoon, T. Altameem, and A. Altameem, “Internet of things sensor assisted security and quality analysis for health care data sets using artificial intelligent based heuristic health management system,” Measurement, vol. 161, p. 107861, 2020.

K. Nomikos, A. Papadimitriou, G. Stergiopoulos, D. Koutras, M. Psarakis, and P. Kotzanikolaou, “On a security-oriented design framework for medical IoT devices: The hardware security perspective,” in 2020 23rd Euromicro Conference on Digital System Design (DSD), 2020: IEEE, pp. 301–308.

P. Kumar and L. Chouhan, “A privacy and session key based authentication scheme for medical IoT networks,” Computer Communications, vol. 166, pp. 154–164, 2021.

T. M. Ghazal, “Internet of things with artificial intelligence for health care security,” Arabian Journal for Science and Engineering, 2021.

S. Oniani, G. Marques, S. Barnovi, I. M. Pires, and A. K. Bhoi, “Artificial intelligence for internet of things and enhanced medical systems,” in Bio-inspired neurocomputing: Springer, 2021, pp. 43–59.

Downloads

Published

2023-11-17

How to Cite

1.
Lu Y. Security and Privacy of Internet of Things: A Review of Challenges and Solutions. JCSANDM [Internet]. 2023 Nov. 17 [cited 2024 Nov. 23];12(06):813-44. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22587

Issue

Section

Articles