Please use this identifier to cite or link to this item: https://doi.org/10.1109/ACCESS.2019.2924045
Title: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Authors: Hassija, V.
Chamola, V.
Saxena, V.
Jain, D.
Goyal, P.
Sikdar, B. 
Keywords: Blockchain
Distributed systems
Edge computing
Fog computing
Internet of Things (IoT)
IoT applications
IoT security
Machine learning
Issue Date: 2019
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7 : 82721-82743. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2924045
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Abstract: The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed. © 2013 IEEE.
Source Title: IEEE Access
URI: https://scholarbank.nus.edu.sg/handle/10635/210052
ISSN: 2169-3536
DOI: 10.1109/ACCESS.2019.2924045
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections:Staff Publications
Elements

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1109_ACCESS_2019_2924045.pdf3.95 MBAdobe PDF

OPEN

NoneView/Download

SCOPUSTM   
Citations

505
checked on Sep 30, 2022

Page view(s)

69
checked on Oct 6, 2022

Download(s)

1
checked on Oct 6, 2022

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons