Open Access Open Access  Restricted Access Subscription or Fee Access

IoT Security Techniques and Security Threats: A Survey

V. Shilpa

Abstract


New inventions in technology have made us digitally dependent as we obtain maximum benefit and comfort from it. Internet of Things (IoT) is a technology where the internet interacts with objects. IoT devices have been in continuous use and have become a fundamental part of our modern society. Usage of IoT in various fields includes home security, medical industry, military, agriculture, transportation, etc. Such devices enable our living spaces to be more autonomous, adaptive, efficient, and convenient. However, security and privacy are the biggest concerns while using these digitally equipped spaces. The dramatic increase in the number of IoT network-connected devices has increased the malware attacks. IoT security and privacy thus aim to protect the IoT devices and harden the IoT system architecture using firewalls, video surveillance, intrusion detection system, and other techniques. In accordance, many security techniques designed and developed create secure usage Iot at least to some extent. This paper presents some of the security techniques and solutions that have been in use to overcome IoT security issues. Also, the various security threats and security attacks are mentioned, along with the respective security solutions.


Keywords


Security, Internet of Things (IoT), Security Threats, Security Techniques, RFID, WSN

Full Text:

PDF

References


Indrajit Patil, Saurabh Jaiswal, Pallavi Sakhare, Mohammad Shoaib, Asst. Prof. Poonam Gupta “A Survey on IOT Based Security System” IJARCEE Vol 5, Issue 11, November 2016

Nishikawa, Dr. Kamna Solankib , Dr. Sandeep Dalalc “ Security Techniques in Internet of Things (IoT)” (ICIoTCT) 2018

Shinsuke Tanaka Kenzaburo Fujishima Nodoka Mimura, Dr. Eng. Tetsuya Ohashi Mayuko Tanaka “IoT System Security Issues and Solution Approaches” Hitachi Review Vol. 65 (2016)

Charles Wheelus and Xingquan Zhu “IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework” October 2020

Norharyati binti Harum, Mohanad Faeq Ali, Nurul Azma Zakaria, Syahrulnaziah Anawar “Smart Surveillance System using Background Subtraction Technique in IoT Application” IJACSA Vol. 9, No. 12, 2018

Sundaraj “Real-Time Face Detection using Dynamic Background Subtraction” Issue 11, Volume 5, November 2008

Wen-Tsai Sung1 and Sung-Jung Hsiao “IoT Network Security and Applications via Long Range Technology” Vol. 32, No. 1 (2020)

Derek Johnson, Mohammed Ketel “IoT: Application Protocols and Security” April 2019

R. Shantha Mary Joshitta, L. Arockiam “Security in IoT Environment: A Survey” IJITME Vol.2 Issue. 7, July- 2016

Suad Mohammed Othman, Fasl Mutaher Ba-Alwi, Nabeel T.Alsohybe, Amal Y. Al-Hashida “Intrusion detection model using machine learning algorithm on Big Data environment” September 2018

S. R. Vijaylakshmi, S. Muruganand “Smoke detection in video images using background subtraction method for early fire alarm system” 2017

Sidra Ijaz, Munam Ali Shah, Abid Khan, Mansoor Ahmed “Smart Cities: A Survey on security concerns” Vol 7, No 6, 2016


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.