Open Access   Article Go Back

A Literature Survey on Security & Privacy Issues in IoT

Kamaljit Kaur1 , Ramanjot Kaur2

Section:Survey Paper, Product Type: Journal Paper
Volume-9 , Issue-4 , Page no. 60-64, Apr-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i4.6064

Online published on Apr 30, 2021

Copyright © Kamaljit Kaur, Ramanjot Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kamaljit Kaur, Ramanjot Kaur, “A Literature Survey on Security & Privacy Issues in IoT,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.4, pp.60-64, 2021.

MLA Style Citation: Kamaljit Kaur, Ramanjot Kaur "A Literature Survey on Security & Privacy Issues in IoT." International Journal of Computer Sciences and Engineering 9.4 (2021): 60-64.

APA Style Citation: Kamaljit Kaur, Ramanjot Kaur, (2021). A Literature Survey on Security & Privacy Issues in IoT. International Journal of Computer Sciences and Engineering, 9(4), 60-64.

BibTex Style Citation:
@article{Kaur_2021,
author = {Kamaljit Kaur, Ramanjot Kaur},
title = {A Literature Survey on Security & Privacy Issues in IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2021},
volume = {9},
Issue = {4},
month = {4},
year = {2021},
issn = {2347-2693},
pages = {60-64},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5326},
doi = {https://doi.org/10.26438/ijcse/v9i4.6064}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i4.6064}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5326
TI - A Literature Survey on Security & Privacy Issues in IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Kamaljit Kaur, Ramanjot Kaur
PY - 2021
DA - 2021/04/30
PB - IJCSE, Indore, INDIA
SP - 60-64
IS - 4
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
335 400 downloads 250 downloads
  
  
           

Abstract

In the 21st century IoT plays a major role in all domains The Internet of Things (IoT) is the network of billions of devices, people and services to Interconnect and exchange information and useful data. The IoT applications are highly affirming to increase the level of comfort, efficiency and automations for the user. Due to rapid increase of devices, people, vehicles connecting with the IoT network from anywhere and anytime which causes security and privacy issues.The high level of security and privacy, authentication and recovery from the attacks is required to implement an IoT automated world. All the IoT security threats including DoS, Man-in-the-middle, Tempering, jamming etc. are discussed in the survey

Key-Words / Index Term

Internet of Things, characteristics of IoT, IoT security, IoT future development. Security; Authentication; Attacks

References

[1] Ray, Partha Pratim. "A survey of IoT cloud platforms." Future Computing and Informatics Journal 1.1-2 (2016): 35-46.
[2] Tank, Birju, Hardik Upadhyay, and Hirenc Patel. "A survey on IoT privacy issues and mitigation techniques." Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. 2016.
[3] Samie, Farzad, Lars Bauer, and Jörg Henkel. "IoT technologies for embedded computing: A survey." 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ ISSS). IEEE, 2016.
[4] Lee, Suk Kyu, Mungyu Bae, and Hwangnam Kim. "Future of IoT networks: A survey." Applied Sciences 7.10 (2017): 1072.
[5] Hassan, Wan Haslina. "Current research on Internet of Things (IoT) security: A survey." Computer networks 148 (2019): 283-294.
[6] Ishaq, Isam, et al. "IETF standardization in the field of the internet of things (IoT): a survey." Journal of Sensor and Actuator Networks 2.2 (2013): 235-287.
[7] Gilchrist, Alasdair. IoT security issues. Walter de Gruyter GmbH & Co KG, 2017.
[8] Shah, Sajjad Hussain, and Ilyas Yaqoob. "A survey: Internet of Things (IOT) technologies, applications and challenges." 2016 IEEE Smart Energy Grid Engineering (SEGE). IEEE, 2016.
[9] Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: A survey." 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2017.
[10] Schurgot, Mary R., David A. Shinberg, and Lloyd G. Greenwald. "Experiments with security and privacy in IoT networks." 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2015.
[11] Safdar, Noreen, Hala Asif, and Fatima Farooq. "Energy Use and Human Health Nexus in Pakistan." Review of Economics and Development Studies 6.3 (2020): 661-674.
[12] Gravely, Shannon, et al. "Discussions between health professionals and smokers about nicotine vaping products: Results from the 2016 ITC Four Country Smoking and Vaping Survey." Addiction 114 (2019): 71-85.
[13] Abu-Elkheir, Mervat, Mohammad Hayajneh, and Najah Abu Ali. "Data management for the internet of things: Design primitives and solution." Sensors 13.11 (2013): 15582-15612.
[14] Bohli, Jens-Matthias, et al. "SMARTIE project: Secure IoT data management for smart cities." 2015 International Conference on Recent Advances in Internet of Things (RIoT). IEEE, 2015.
[15] Zhang, PeiYun, MengChu Zhou, and Giancarlo Fortino. "Security and trust issues in fog computing: A survey." Future Generation Computer Systems 88 (2018): 16-27.
[16] Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
[17] Bertino, Elisa, and Nayeem Islam. "Botnets and internet of things security." Computer 50.2 (2017): 76-79.
[18] Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, and Ioannis D. Moscholios. "Securing the Internet of Things: Challenges, threats and solutions." Internet of Things 5 (2019): 41-70.
[19] Ramotsoela, Daniel, Adnan Abu-Mahfouz, and Gerhard Hancke. "A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study." Sensors 18.8 (2018): 2491.
[20] Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the Internet of Things: Current status and open issues." 2014 international conference on privacy and security in mobile systems (PRISMS). IEEE, 2014.
[21] Hassija, Vikas, et al. "A survey on IoT security: application areas, security threats, and solution architectures." IEEE Access 7 (2019): 82721-82743.
[22] Cerullo, Gianfranco, et al. "Iot and sensor networks security." Security and Resilience in Intelligent Data-Centric Systems and Communication Networks. Academic Press, 2018. 77-101.
[23] Tang, Xiao, Pinyi Ren, and Zhu Han. "Jamming mitigation via hierarchical security game for iot communications." IEEE Access 6 (2018): 5766-5779.