4.6 Article

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Journal

IEEE ACCESS
Volume 7, Issue -, Pages 82721-82743

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2019.2924045

Keywords

Internet of Things (IoT); IoT security; blockchain; fog computing; edge computing; machine learning; IoT applications; distributed systems

Funding

  1. National Research Foundation, Prime Minister's Office, Singapore, through its Corporate Laboratory@University Scheme
  2. National University of Singapore
  3. Singapore Telecommunications Ltd.

Ask authors/readers for more resources

The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an evergrowing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available