首页    期刊浏览 2024年12月04日 星期三
登录注册

文章基本信息

  • 标题:A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
  • 本地全文:下载
  • 作者:Muath A. Obaidat ; Suhaib Obeidat ; Jennifer Holst
  • 期刊名称:Computers
  • 电子版ISSN:2073-431X
  • 出版年度:2020
  • 卷号:9
  • 期号:2
  • 页码:44-86
  • DOI:10.3390/computers9020044
  • 出版社:MDPI Publishing
  • 摘要:The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem.
  • 关键词:security; privacy; cyber-attack; threat; mitigations; risk; cryptography; vulnerability; intrusion; encryption-key security ; privacy ; cyber-attack ; threat ; mitigations ; risk ; cryptography ; vulnerability ; intrusion ; encryption-key
国家哲学社会科学文献中心版权所有