A Comprehensive Study of IoT Security Issues and Protocols

Main Article Content

Abou Bakary Ballo
Diarra Mamadou

Abstract

The abstract emphasizes the paramount importance of integrating digital security and privacy measures into IoT (Internet of Things) technologies to fully unlock their potential. It acknowledges the looming risks to consumer safety and security posed by vulnerabilities in individual IoT devices, connectivity, and back end systems, as well as the escalating threat of large-scale cyberattacks leveraging insecure IoT devices. Despite numerous initiatives by government agencies, academic institutions, industry groups, and vendors to address IoT security challenges, the abstract highlights the lack of collaboration and clarity in the current landscape. It underscores the urgent need for harmonization of security recommendations, guidelines, and certification processes within the IoT ecosystem to ensure robust protection and efficient operation.

Article Details

How to Cite
[1]
Abou Bakary Ballo and Diarra Mamadou, “A Comprehensive Study of IoT Security Issues and Protocols ”, Int. J. Comput. Eng. Res. Trends, vol. 10, no. 7, pp. 8–14, Jul. 2023.
Section
Reviews

References

Ahmad, S., Mehmood, F., Mehmood, A., & Kim, D. (2019). Design and Implementation of Decoupled IoT Application Store: A Novel Prototype for Virtual Objects Sharing and Discovery. Electronics, 8(3), 285. https://doi.org/10.3390/electronics8030285

Bodei, C., Chessa, S., & Galletta, L. (2019). Measuring Security in IoT Communications. Theoretical Computer Science, 764, 100–124. https://doi.org/10.1016/j.tcs.2018.12.002

Conti, M., Kaliyar, P., & Lal, C. (2018). CENSOR: Cloud‐Enabled Secure IoT Architecture over SDN Paradigm. Concurrency and Computation: Practice and Experience, 31(8). https://doi.org/10.1002/cpe.4978

Likhitha, K., Malineni, S., Jampani, N., & Prasanna, N. L. (2019). Home Security System Using PIR Sensor-IoT. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, August 2019, 497–500. https://doi.org/10.32628/cseit195272

Abdur, M., Habib, S., Ali, M., & Ullah, S. (2017). Security Issues in the Internet of Things (IoT): A Comprehensive Study. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080650

Choi, J., In, Y., Park, C., Seok, S., Seo, H., & Kim, H. (2016). Secure IoT Framework and 2D Architecture for End-To-End Security. The Journal of Supercomputing, 74(8), 3521–3535. https://doi.org/10.1007/s11227-016-1684-0

Sivakumar, S. A., John, T. J., Selvi, G. T., Madhu, B., Shankar, C. U., & Arjun, K. P. (2021). IoT based Intelligent Attendance Monitoring with Face Recognition Scheme. In 2021 5th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 349-353). IEEE.

Cynthia, J., Sultana, H. P., Saroja, M. N., & Senthil, J. (2018). Security Protocols for IoT. In Studies in Big Data Ubiquitous Computing and Computing Security of IoT, April 2018, 1–28. https://doi.org/10.1007/978-3-030-01566-4_1

Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Security & Privacy, 15(2), 24–30. https://doi.org/10.1109/msp.2017.43

Li, T., Gao, C., Jiang, L., Pedrycz, W., & Shen, J. (2019). Publicly Verifiable Privacy-Preserving Aggregation and Its Application in IoT. Journal of Network and Computer Applications, 126, 39–44. https://doi.org/10.1016/j.jnca.2018.09.018

Mao, B., Kawamoto, Y., Liu, J., & Kato, N. (2019). Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks. IEEE Communications Letters, 23(11), 2130–2134. https://doi.org/10.1109/lcomm.2019.2932988

Madhu, B., & Gopalachari, M. V. (2023). Classification of the Severity of Attacks on Internet of Things Networks. In Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022 (pp. 411-424). Singapore: Springer Nature Singapore.

Maram, B., Gnanasekar, J. M., Manogaran, G., & Balaanand, M. (2018). Intelligent Security Algorithm for UNICODE Data Privacy and Security in IOT. Service Oriented Computing and Applications, 13(1), 3–15. https://doi.org/10.1007/s11761-018-0249-x

Madhu, B., Gopala Chari, M. V., Vankdothu, R., Silivery, A. K., & Aerranagula, V. (2023). Intrusion detection models for IOT networks via deep learning approaches. Measurement: Sensors, 25, 100641.

Ali, B., & Awad, A. (2018). Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors, 18(3), 817. https://doi.org/10.3390/s18030817

Alharby, S., Harris, N., Weddell, A., & Reeve, J. (2018). The security trade-offs in resource constrained nodes for IoT application. International Journal of Electronics and Communication Engineering, 12(1), 52-59. https://doi.org/10.1999/1307-6892/10008451