Please use this identifier to cite or link to this item: https://doi.org/10.1109/ACCESS.2019.2924045
DC FieldValue
dc.titleA Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
dc.contributor.authorHassija, V.
dc.contributor.authorChamola, V.
dc.contributor.authorSaxena, V.
dc.contributor.authorJain, D.
dc.contributor.authorGoyal, P.
dc.contributor.authorSikdar, B.
dc.date.accessioned2021-12-09T04:57:18Z
dc.date.available2021-12-09T04:57:18Z
dc.date.issued2019
dc.identifier.citationHassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7 : 82721-82743. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2924045
dc.identifier.issn2169-3536
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/210052
dc.description.abstractThe Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. The existing and upcoming IoT applications are highly promising to increase the level of comfort, efficiency, and automation for the users. To be able to implement such a world in an ever-growing fashion requires high security, privacy, authentication, and recovery from attacks. In this regard, it is imperative to make the required changes in the architecture of the IoT applications for achieving end-to-end secure IoT environments. In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. After discussing the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications are discussed. Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed. © 2013 IEEE.
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.sourceScopus OA2019
dc.subjectBlockchain
dc.subjectDistributed systems
dc.subjectEdge computing
dc.subjectFog computing
dc.subjectInternet of Things (IoT)
dc.subjectIoT applications
dc.subjectIoT security
dc.subjectMachine learning
dc.typeReview
dc.contributor.departmentELECTRICAL AND COMPUTER ENGINEERING
dc.description.doi10.1109/ACCESS.2019.2924045
dc.description.sourcetitleIEEE Access
dc.description.volume7
dc.description.page82721-82743
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1109_ACCESS_2019_2924045.pdf3.95 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons