College of Science and Engineering, Central Michigan University, Mount Pleasant, MI 48858, USA.
Department of Mathematics and Computer Science, Texas Woman's University, Denton, TX 76204, USA.
Sensors (Basel). 2022 Sep 30;22(19):7433. doi: 10.3390/s22197433.
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
物联网 (IoT) 产品在日常生活的各个方面都得到了广泛的接受和日益增长的需求,这为人类、数据和流程的参与创造了一个有前途的前景。广阔的领域从家庭到工业创造了机会,实现了自动化的生命周期。人类生活涉及到许多应用,如智能交通、智能医疗、智能电网、智慧城市等。通过各种安全威胁,形成了一个繁荣的表面,可以影响社会、经济、环境、政治和健康。一般来说,物联网设备容易受到安全漏洞的攻击,工业系统的发展可能会带来破坏性的安全漏洞。为了建立一个可靠的安全屏障,必须接受所遇到的挑战。因此,本调查论文主要旨在通过基于对象对攻击/漏洞进行分类,以帮助研究人员。在这项工作中,为每种攻击提供了攻击方法和相关的对策。重点介绍了物联网最重要应用的安全解决方案案例研究。安全解决方案的调查不仅限于传统的基于秘密密钥的加密解决方案,而且还说明了基于物理不可克隆函数 (PUF) 的解决方案和区块链。这里还讨论了每种安全解决方案的优缺点。此外,本工作还提出了挑战和建议。