DOI QR코드

DOI QR Code

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Received : 2023.09.05
  • Published : 2023.09.30

Abstract

The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

Keywords

References

  1. Burhan, M., et al., IoT elements, layered architectures and security issues: a comprehensive survey. Sensors, 2018. 18(9): p. 2796.
  2. Mahmoud, R., et al. Internet of things (IoT) security: Current status, challenges and prospective measures. in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). 2015. IEEE.
  3. Kumar, S.A., T. Vealey, and H. Srivastava. Security in internet of things: Challenges, solutions and future directions. in 2016 49th Hawaii International Conference on System Sciences (HICSS). 2016. IEEE.
  4. Abomhara, M., Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 2015. 4(1): p. 65-88. https://doi.org/10.13052/jcsm2245-1439.414
  5. Prasad, N.R. Threat model framework and methodology for personal networks (PNs). in 2007 2nd International Conference on Communication Systems Software and Middleware. 2007. IEEE.
  6. Kumar, J.S. and D.R. Patel, A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 2014. 90(11).
  7. Singh, D., G. Tripathi, and A. Jara. Secure layers based architecture for Internet of Things. in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). 2015. IEEE.
  8. Ravindran, R., J. Yomas, and E. Jubin Sebastian, IoT: A review on security issues and measures. International Journal of Engineering Science and Technology, 2015. 5(6): p. 348-351.
  9. Perez, S., et al. ARMOUR: Large-scale experiments for IoT security & trust. in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 2016. IEEE.
  10. Al-Qaseemi, S.A., et al. IoT architecture challenges and issues: Lack of standardization. in 2016 Future Technologies Conference (FTC). 2016. IEEE.
  11. Varga, P., et al. Security threats and issues in automation IoT. in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS). 2017. IEEE.
  12. Vashi, S., et al. Internet of Things (IoT): A vision, architectural elements, and security issues. in 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
  13. Naik, S. and V. Maral. Cyber security-IoT. in 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). 2017. IEEE.
  14. Frustaci, M., et al., Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 2017. 5(4): p. 2483-2495. https://doi.org/10.1109/JIOT.2017.2767291
  15. Chinanu, U.E., O.E. Oche, and J.O. Okah-Edemoh, Architectural Layers of Internet of Things: Analysis of Security Threats and Their Countermeasures. Scientific Review, 2018. 4(10): p. 80-89.
  16. Rao, T.A., Security challenges facing IoT layers and its protective measures. International Journal of Computer Applications, 2018. 975: p. 8887.
  17. Aydos, M., Y. Vural, and A. Tekerek, Assessing risks and threats with layered approach to Internet of Things security. Measurement and Control, 2019. 52(5-6): p. 338-353. https://doi.org/10.1177/0020294019837991
  18. Azam, F., et al., Internet Of Things (Iot), Security Issues And Its Solutions. Science Heritage Journal (GWS), 2019. 3(2): p. 18-21. https://doi.org/10.26480/gws.02.2019.18.21
  19. Kraijak, S. and P. Tuwanut, A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. 2015.
  20. Ahemd, M.M., M.A. Shah, and A. Wahid. IoT security: A layered approach for attacks & defenses. in 2017 International Conference on Communication Technologies (ComTech). 2017. IEEE.
  21. Frustaci, M., P. Pace, and G. Aloi. Securing the IoT world: issues and perspectives. in 2017 IEEE Conference on Standards for Communications and Networking (CSCN). 2017. IEEE.
  22. Deogirikar, J. and A. Vidhate. Security attacks in IoT: A survey. in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
  23. Jain, A. and T. Singh, Security Challenges and Solutions of IoT Ecosystem, in Information and Communication Technology for Sustainable Development. 2020, Springer. p. 259-270.
  24. Ahmed, A.W., et al., A comprehensive analysis on the security threats and their countermeasures of IoT. International Journal of Advanced Computer Science and Applications, 2017. 8(7): p. 489-501.
  25. Khan, M.A. and K. Salah, IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018. 82: p. 395-411. https://doi.org/10.1016/j.future.2017.11.022
  26. Gautam, S., et al. Recent Advances and Countermeasures Against Various Attacks in IoT Environment. in 2019 2nd International Conference on Signal Processing and Communication (ICSPC). 2019. IEEE.
  27. Swamy, S.N., D. Jadhav, and N. Kulkarni. Security threats in the application layer in IOT applications. in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). 2017. IEEE.
  28. Chen, C.-M., et al., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Transactions on parallel and distributed systems, 2011. 23(4): p. 727-734. https://doi.org/10.1109/TPDS.2011.219
  29. Daneshmand, S., et al., A low-complexity GPS anti-spoofing method using a multi-antenna array. a a, 2012. 2: p. 2.
  30. Salman, T. and R. Jain, Networking protocols and standards for internet of things. Internet of Things and Data Analytics Handbook, 2015. 2015: p. 215-238.
  31. Salman, T. and R. Jain, A survey of protocols and standards for internet of things. arXiv preprint arXiv:1903.11549, 2019.
  32. Tukade, T.M. and R. Banakar, Data transfer protocols in IoT-An overview. International Journal of Pure and Applied Mathematics, 2018. 118(16): p. 121-138.
  33. Yassein, M.B. and M.Q. Shatnawi. Application layer protocols for the Internet of Things: A survey. in 2016 International Conference on Engineering & MIS (ICEMIS). 2016. IEEE.