Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ACCESS.2019.2924045
Title: | A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures | Authors: | Hassija, V. Chamola, V. Saxena, V. Jain, D. Goyal, P. Sikdar, B. |
Keywords: | Blockchain Distributed systems Edge computing Fog computing Internet of Things (IoT) IoT applications IoT security Machine learning |
Issue Date: | 2019 | Publisher: | Institute of Electrical and Electronics Engineers Inc. | Citation: | Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7 : 82721-82743. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2924045 | Rights: | Attribution-NonCommercial-NoDerivatives 4.0 International | Abstract: | The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed. © 2013 IEEE. | Source Title: | IEEE Access | URI: | https://scholarbank.nus.edu.sg/handle/10635/210052 | ISSN: | 2169-3536 | DOI: | 10.1109/ACCESS.2019.2924045 | Rights: | Attribution-NonCommercial-NoDerivatives 4.0 International |
Appears in Collections: | Staff Publications Elements |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1109_ACCESS_2019_2924045.pdf | 3.95 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License