Data Security Challenges with its Defence Strategies of Internet of Things: Critical Review Study
DOI:
https://doi.org/10.26713/cma.v13i1.1980Keywords:
Internet of Things, Data security, Confidentiality, Privacy, Authentication, Access control, IoTAbstract
Due to the sensitivity of the data security issue and the lack of studies focused on data security in the Internet of Things (IoT) environment; this paper-through the methodology of critical review of relevant previous and recent studies-aimed to extract the most important challenges or problems and technical and defence strategies and solutions related to securing data in IoT. That is all In order to serve as a practical guide to benefit the concerned ones. As for the results of the studies, there were several things, including: that the most common security issues and challenges within the previous studies were: confidentiality, privacy and encryption effectiveness, and authentication methods are the best methods for securing data by nearly 60%, and the most important of these methods is lightweight authentication, multi-factor authentication, then mutual authentication. In addition, it is necessary to pay attention to securing all layers of the IoT. Especially the perception layer; as it is the main interface for the attack for easy physical access to the end nodes and web interfaces. Moreover, there are several modern technologies and methods that contribute to securing data such as: lightweight systems, digital twins, Software-Defined Network (SDN), edge computing and engineering, fog computing, trust computing, Context aware of accessibility. As for the recommendations, the study recommended all the following. IoT service providers should adopt several security methods, techniques and protocols in order to raise the level of security during data transfer and storage. The concerned organizations and bodies should issue unified laws and frameworks in order to standardize the work in IoT environment and In order to protect the confidentiality and privacy of data.
Downloads
References
M. Adil and M.K. Khan, Emerging IoT applications in sustainable smart cities for COVID-19: Network security and data preservation challenges with future directions, Sustainable Cities and Society 75 (2021), 103311, DOI: 10.1016/j.scs.2021.103311.
K. Aldriwish, A double-blockchain architecture for secure storage and transaction on the Internet of Things networks, International Journal of Computer Science and Network Security 21(6) (2021), 119 – 126, DOI: 10.22937/IJCSNS.2021.21.6.16.
E. Bertino, Data security and privacy in the IoT, in: Proceedings of the 19th International Conference on Extending Database Technology, March 15-18, 2016, Bordeaux, France, Open Proceedings, pp. 1 – 3, (2016), DOI: 10.5441/002/edbt.2016.02.
H.R. Ghorbani and M.H. Ahmadzadegan, Security challenges in internet of things: Survey, 2017 IEEE Conference on Wireless Sensors (ICWiSe), pp. 1 – 6, (2017), DOI: 10.1109/ICWISE.2017.8267153.
F.A. Habeeb and Q.M. Hussien, Survey on data security techniques in Internet of Things, AlKunooze Scientific Journal 2(2) (2021), 27 – 37.
H. Kumar and G. Deepak, Mutual authentication and data security in IoT using hybrid mac id and elliptical curve cryptography, Turkish Journal of Computer and Mathematics Education 12(11) (2021), 501 – 507, URL: https://turcomat.org/index.php/turkbilmat/article/view/5913.
S.A. Kumar, T. Vealey and H. Srivastava, Security in Internet of Things: Challenges, solutions and future directions, 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772 – 5781, (2016), DOI: 10.1109/HICSS.2016.714.
SCU Learning Experience Team (2020), Writing a critical review, Learning zone, Southern Cross University, available at: https://www.scu.edu.au/media/scueduau/staff/teaching-and-learning/talking-teaching/writing_a_critical_review.pdf.
M.S. Lingam and A.M. Sudhakara, Security in Internet of Things systems, International Journal of Engineering Research & Technology 4(29) (2016), 1 – 5, URL: https://www.ijert.org/research/security-in-internet-of-things-systems-IJERTCONV4IS29040.pdf.
M.M. Noor and W.H. Hassan, Current research on Internet of Things (IoT) security: A survey, Computer Networks 148 (2019), 283 – 294, DOI: 10.1016/j.comnet.2018.11.025.
M.M. Ogonji, G. Okeyo and J.M. Wafula, A survey on privacy and security of Internet of Things, Computer Science Review 38 (2020), 100312, DOI: 10.1016/j.cosrev.2020.100312.
L. Tawalbeh, F. Muheidat, M. Tawalbeh and M. Quwaider, IoT privacy and security: Challenges and solutions, Applied Science 10 (2020), 4102, DOI: 10.3390/app10124102.
S.M. Umran, S. Lu, Z.A. Abduljabbar, J. Zhu and J. Wu, Secure data of industrial Internet of Things in a cement factory based on a blockchain technology, Applied Sciences 11(14) (2021), 6376, DOI: 10.3390/app11146376.
T. Wang, Y. Mei, X. Liu, J. Wang, H.-N. Dai and Z. Wang, Edge-based auditing method for data security in resource-constrained Internet of Things, Journal of Systems Architecture 114 (2021), 101971, DOI: 10.1016/j.sysarc.2020.101971.
S. Zaman, K. Alhazmi, M.A. Aseeri, M.R. Ahmed, R.T. Khan, M.S. Kaiser and M. Mahmud, Security threats and artificial intelligence based countermeasures for Internet of Things networks: A comprehensive survey, IEEE Access 9 (2021), 94668 – 94690, DOI: 10.1109/ACCESS.2021.3089681.
W. Zhou, Y. Jia, A. Peng, Y. Zhang and P. Liu, The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved, Internet of Things Journal 6(2) (2018), 1606 – 1616, DOI: 10.1109/JIOT.2018.2847733.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.