The Internet of Things (IoT) is rapidly growing and bringing innovation to various fields. However, this expansion comes with challenges, especially in terms of security. This survey focuses on IoT security and privacy, highlighting the need for strong protocols and standards. It explores security issues in interconnected devices, smart homes, and cities. The paper discusses current security situations, addressing problems like unauthorized access and data manipulation. It suggests solutions through sustainable standards. Despite the ongoing introduction of new smart devices, security concerns are often overlooked, posing risks for consumers and businesses. The paper concludes with a summary, laying the groundwork for future research to enhance IoT security protocols.
References
Akyildiz, Ian F., et al. "A survey on sensor networks." Communications magazine, IEEE 40.8 (2019): 102-114.
Ling, Chung-Huei, et al. "A Secure and Efficient One-time Password Authentication Scheme for WSN." International Journal of Network Security19.2 (2018): 177-181.
Tsuji, Takasuke, and Akihiro Shimizu. "One-time password authentication protocol against theft attacks." IEICE transactions on communications 87.3 (2016): 523-529.
Arampatzis, Th, John Lygeros, and Stamatis Manesis. "A survey of applications of wireless sensors and wireless sensor networks." Intelligent Control, 2009. Proceedings of the 2009 IEEE International Symposium on, Mediterrean Conference on Control and Automation. IEEE, 2009.
Tsudik, Gene. "Message authentication with one-way hash functions." INFOCOM'19. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 2019.
Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006).
Dogra, Heena, and Jyoti Kohli. "Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey." Indian Journal of Science and Technology 9.47 (2016).
Lamport, Leslie. "Password authentication with insecure communication."Communications of the ACM 24.11 (1981): 770-772.
SHABANA, K., FIDA, N., KHAN, F., JAN, S., REHMAN, M.. Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), North America, 5, jul. 2016.
Büsching and L. Wolf, "The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink," in IEEE Internet of Things Journal, vol. 2, no. 1, pp. 63-71, Feb. 2015.
P. Singh, M. Hussain and C. K. Raina, "Authentication of base station by HDFS using trust based model in WSN," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2016, pp. 1-5.
W. Choi and I. Y. Lee, "A key distribution system for user authentication using pairing-based in WSN," 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-4.
S. S. Abd El dayem, M. R. M. Rizk and M. A. Mokhtar, "An efficient authentication protocol and key establishment in dynamic WSN," 2016 6th International Conference on Information Communication and Management (ICICM), Hatfield, 2016, pp. 178-182.
H. Moon, U. Iqbal and G. M. Bhat, "Light weight Authentication Framework for WSN," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 3099-3105.
P. Joshi, M. Verma and P. R. Verma, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN," 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2015, pp. 527-532.
P. Banerjee, T. Chatterjee and S. DasBit, "LoENA: Low-overhead encryption based node authentication in WSN," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, 2015, pp. 2126-2132.
Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet. A Lightweight IoT Security Protocol. 1st Cyber Security in Networking Conference (CSNet2017), Oct 2017, Rio de Janeiro, Brazil.
Armando, Alessandro, et al. "The AVISPA tool for theautomated validation of internet security protocols and applications." International conference on computer aided verification. Springer, Berlin, Heidelberg, 2005.
Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, and Ioannis D. Moscholios. "Securing the Internet of Things: Challenges, threats and solutions." Internet of Things 5 (2019): 41-70.
Ramotsoela, Daniel, Adnan Abu-Mahfouz, and Gerhard Hancke. "A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study." Sensors 18.8 (2018): 2491.
Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current status and open issues." 2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.
Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
Cerullo, Gianfranco, et al. "Iot and sensor networks security." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.
Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779.
Thakkar, Ankit, and Ritika Lohiya. "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28.4 (2021): 3211-3243.
Lin, Yun‐Wei, Yi‐Bing Lin, and Chun‐You Liu. "AItalk: a tutorial to implement AI as IoT devices." IET Networks 8.3 (2019): 195-202.