Next Article in Journal
Application of Continuous Wavelet Transform and Artificial Naural Network for Automatic Radar Signal Recognition
Previous Article in Journal
A Review on Human Comfort Factors, Measurements, and Improvements in Human–Robot Collaboration
Previous Article in Special Issue
Security and Privacy Analysis of Youth-Oriented Connected Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Internet of Things: Security and Solutions Survey

by
Pintu Kumar Sadhu
1,*,
Venkata P. Yanambaka
2 and
Ahmed Abdelgawad
1
1
College of Science and Engineering, Central Michigan University, Mount Pleasant, MI 48858, USA
2
Department of Mathematics and Computer Science, Texas Woman’s University, Denton, TX 76204, USA
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(19), 7433; https://doi.org/10.3390/s22197433
Submission received: 8 September 2022 / Revised: 27 September 2022 / Accepted: 27 September 2022 / Published: 30 September 2022
(This article belongs to the Special Issue Security and Privacy in Internet of Things (IoT))

Abstract

:
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.

1. Introduction

Devices like the Internet of Things (IoT) have a significant presence in our daily lives owing to the technological revolution, wireless devices, and communication systems. IoT has become a vital part of the digital era of Industry 4.0. The ability to bring physical things into the digital world is becoming more likely because of technology [1]. IoT networks have an impact on a variety of areas, including home monitoring and daily life patient monitoring. IoT integrates the advantage of data processing, analytics, and draws out the power of the web to make decisions for physical objects of the real world. It is a system where intelligent objects are linked and access the internet as the foundation of the interconnection to gather and share information using “Things”. IoT has become one of the main focuses of research across the world.

1.1. Paper Organization

To depict the overall scenario and solutions, this paper is organized as Figure 1. To give an overview of the IoT ecosystem, security threats, and respective solutions to the new and existing researchers, this paper does a comprehensive review. To provide a better view, this paper shows the various applications of IoT, different security threats, security mechanisms, authentication frameworks, and future directions sequentially. Section 1 presents the overview of IoT, IoE, and data security and privacy. Section 2 shows the related work. The overview of different IoT applications, their importance, prospects, functionality, impact, and challenges are discussed in Section 3. After that, security constraints of IoT devices, attacks on the TCP/IP reference model’s various layers, and attacks on each layer of the IoT network in detail are discussed in Section 4. Different cryptographic operations are presented in Section 5. Moreover, existing cryptographic security solutions with pros and cons are discussed in Section 6. Furthermore, this paper shows security challenges and future directions in Section 7.
Table 1 presents the notations that are commonly used in the paper.

1.2. Motivations

IoT seeks to link equipment to the web to make it accessible anytime, anywhere, and by anyone. With the help of seamless connectivity and smart objects like washing machines, microwave ovens, meters, vehicles, mobile phones, refrigerators, medical devices, etc., IoT is making remarkable applications such as intelligent transport systems, smart healthcare, smart homes, smart cities, etc. Ericsson forecasted that by 2022 there would be 29 billion connected devices, among which 18 billion will be IoT devices. Considering the vast utilization of IoT devices, the application of IoT and security requirements have increased. Moreover, many devices will be placed in rural areas which will be unattended. An attacker can compromise the devices and find an entry point to compromise the network. Research interest in IoT areas is increased a lot and it has become one of the first priorities among industry and academia, which can be found in the existing literature. Many survey papers show a glimpse or partial of IoT security threats or solutions. We have reviewed many existing studies related to IoT applications, different attacks, and security mechanisms. This paper aims to show security vulnerabilities in IoT devices as well as IoT networks with security solutions to provide insights to the network designers and motivate future research directions for both new and present researchers. The motivation of the paper is to provide all relevant information from existing literature under an umbrella that can benefit future readers by getting the required information from an article.

1.3. Internet of Things

The term ‘IoT’ is also termed as ‘Internet of Objects’. IoT devices are of varying sizes and capabilities of electrical or electronic devices that are capable of connecting to the web. IoT devices can be utilized in a variety of settings, including those shown in Figure 2, including residence, manufacturing, environment, healthcare, electricity, and communication.
IoT can be defined from several perspectives in the literature. Figure 3 shows the elements and paradigm of IoT [1,2]. In the case of the things-oriented vision, the aim of IoT is to become smart through the collaboration and focus of both virtual and physical bodies. These devices see, hear, think, share information, and perform tasks by coordinating decisions [2]. The Internet-oriented vision focuses on the development of IP-based networks so that things can connect and communicate with each other [3]. In the IoT systems, the demand of high volume data flows from and to sensors or smart entities emerges semantic-oriented visions [4]. In the IoT system based on service-oriented vision, IoT intelligent services and applications based on the three perspectives mentioned above are concentrated [5].
Six main elements are required to deliver the functionality of IoT, as shown in Figure 3 [2]. Among six elements, identification is crucial for naming and matching services with their demand. IoT devices capture data by sensing and send data to the cloud/database for analysis. The element of communication is used to bind heterogeneous objects simultaneously to serve specific digital services. WiFi [6], Bluetooth [7], Zigbee [6,8], MQTT [9], IEEE 802.15.4, OPC-UA, NFC, Z-wave, LoRaWAN [10], SigFox, and LTE-Advanced are a few examples of communication protocols. Hardware elements such as microcontrollers, microprocessors, system-on-chip (SoCs), and Field-programmable gate array (FPGAs) are used for processing. Processing units and software applications are used for computing. The combination of both hardware and software elements represents the brain of IoT. The ultimate goal of IoT is to deliver the services at such a level so that it is capable of providing services anytime, anywhere, to anyone.
Generalized IoT system architecture has four layers which are Perception, Network, Processing, and Application layer which is shown in Figure 4 [11,12]. The devices in the perception layer such as sensors of different types, Radio-frequency identification (RFID) scanners, surveillance cameras, Global Positioning System (GPS) modules, conveyor systems, industrial robots, etc., are responsible for monitoring conditions, collecting sensory data, etc. Different communication systems like WiFi, Bluetooth, Zigbee, LTE, etc., with protocols like IPv4, and IPv6 consist of the network layer responsible for data transfer to the next layer’s processing system [13]. Typically, cloud servers and databases in the processing layer are responsible for data analyzing, computing, decision making, and storing a huge amount of data. As per the requirement of users, the application layer delivers the specific needs of the end-users.

1.4. Internet of Everything

IoT is considered the backbone of many smart applications such as the manufacturing industry, smart healthcare, intelligent transportation, smart grid, smart city, etc. “Instrumentation”, “Interconnections”, and “Intelligence” are essential elements of smart applications of IoT and also referred to as 3Is. On the other hand, IoT acts as an integrated component of IoE [14]. Initially, Cisco coined the concept of IoE in 2013 [15]. The primary objective of the IoE technology is to transform gathered data into information or actions, and assist data-based relevant decision-making. Moreover, IoE aims to facilitate new capabilities, proficiency, and great experiences to become a self-contained and productive system. Figure 5 presents the main “four pillars” of IoE [16,17,18]: (1) People, (2) Data, (3) Process, and (4) Things.
  • People, in a system, are a critical element of the IoE environment. With the introduction of IoE, people share their personal insights through innumerable new ways of communication such as social networks, data-collecting smart sensors, actuators, smartwatches, etc. These data are being transmitted to the servers for analyzing and providing relevant information according to their personal, system, industry, or business demands. The information assists the people or system in quickly resolving open issues or reach to decisions.
  • Data are transferred as a traditional IoT network. Data, complete or partial, collected by devices could either be sent directly or after initial transformation in the edge layer. The raw data captured or generated by the device has no importance. Nevertheless when these pieces of data are transformed, summarized, classified, and analyzed by the device itself or by the cloud server at the edge layer, it becomes priceless content that can monitor and control numerous systems, make accurate and faster decisions, and entitle smart solutions.
  • Process based on various systems such as artificial intelligence, deep learning, social networks, computer vision, or other technologies helps to deliver the proper information to the designated people/device/place at the expected time. Through this process, information will be extracted from data, and the data communication will be controlled through the network. The purpose of processes is to get the optimum outcome for further processing or decision making.
  • Things encounter the definition of IoT. Different kinds of sensing elements are embedded with physical items that serve the purpose of the data collection. Different devices must have communication capabilities, wireless or wired, for transmitting generated and processed data to the right destination across the system.
Figure 6 shows the general architecture of the IoE system [15,19]. The IoE system is a combination of blocks of a visualized data center, intelligent network, and connected devices. A virtual data center consists of an operating system, desktop virtualization software, etc. It communicates with an intelligent network to provide services to connected devices (smart sensors, devices, actuators, mobile terminals, wearable devices, etc.) and ultimately human beings. Connected devices are categorized into three segments: human to human, machine to machine, and machine to human. The backbone is an optical fiber network to guarantee a high velocity of the networks to ensure a high presence, low latency, and excellent quality of IoE services [15]. The fiber-optic network can also be replaced with a wireless network.

1.5. Data Privacy and Security

Secure communication is the prime factor for maintaining data privacy and confidentiality in a different kind of IoT and IoE architecture. Regulations linked to data collection, storing in memory, and exchanging details should follow a way that can preserve the user’s personal record is referred to as data privacy. Security can be improved using secure key management [20,21] and physical unclonable function [22]. Figure 7 shows four domains that defines various security concept of IoT-based network [23].
As IoT is becoming an integrated part of our daily life, the usage of IoT-based devices is increasing rapidly. It is predicted that 70% of devices will be IoT-based devices due to the continuous development of urbanization. CISCO predicted that $14.4 trillion devices will be exploited by 2025 [16]. M2M traffic is increasing, and it is expected that it will be up to 45% of the whole Internet traffic by 2022. Another study shows that by 2025 global economy of IoT-based healthcare applications will contribute about $1.1–$2.5 trillion in growth per annum. It will change the global economy, and $2.7 trillion to $6.2 trillion is the estimated impact by 2025 [2]. By 2025, it is reckoned that 75 billion IoT devices will be present in the global network. In the worldwide network, the growth of IoT devices is attracting attackers to gain access to fulfilling their goals. According to Symantec, since the rapid expansion and development, cyber-criminals progressively target IoT technology. In 2019, cyber attacks increased by 300% compared to 2018, and it was approximately 3 billion attacks [23]. In [24], it is also stated that security is the major challenge of the IoE network. Laura DeNardis reckons the threats, and risks of IoE in The Internet in Everything: Freedom and Security in a World With No Off Switch. Privacy, cyber-physical security, and interoperability politics, economic growth, individual rights, business models, governance are also discussed in the book [25].

2. Related Work

IoT has a major impact on people’s daily life which attract researchers to contribute more so that it could become beneficial for human being. Consequently, many researchers worked on the survey of IoT to provide knowledge regarding the IoT ecosystem and its details. A few works were done to provide an overview of challenges faced by IoT. The security threats are reviewed in [11,26,27,28]. In these articles, different kinds of attacks were discussed. Article [29] showed the security flaws in Bluetooth and possible attacks on IoT using vulnerabilities of Bluetooth. Challenges of IoT are presented by others and a few of them are [30,31,32], etc. The article [31] also presented security guidelines and the impact of 5G on IoT systems was discussed in [33]. IoT architecture and layers were focused on in [34] and different protocols are discussed in [28,34,35]. Various applications of IoT were discussed in different papers such as [36] showing the impact of smart logistics in the industry. As IoT is a resource-constrain device, efficient and lightweight operations are required. To cover these things, refs [37,38,39] showed how edge computing can help to process IoT services like smart agriculture, smart logistics, etc. In relation to the above type of researches, it is necessary to ensure secure data transfer and defend against different security attacks. The authentication framework can be designed in both centralized methods and decentralized mechanisms. Blockchain based, decentralize method, solutions were presented in different review papers, for example [11,40,41,42], etc. Smart mobile IoT architecture along with different security mechanisms was presented in [28]. On the other hand, machine learning based intrusion detection solutions were demonstrated in [27,43,44]. However, none of them reviewed the IoT attacks taxonomy, attack surfaces, security mechanisms, secure data communication method, etc., as we did in this research. Table 2 summarizes the contributions of different review papers and mentions how the perspective of our paper is different from other survey papers.
In this survey, the security and privacy risks of IoT are demonstrated. The issues and obstacles of different applications are highlighted. The contributions of this paper are the followings.
  • Overview and elements of both IoT and IoE networks. The differences between these are discussed.
  • Limitations and Vulnerabilities of IoT devices and network. The taxonomy of different layers is provided in detail.
  • Countermeasures of each kind of attack are provided with reference.
  • Available security measures and their application in the sector of IoT are analyzed.
  • Open issues of IoT security systems and future directions are also discussed.

3. IoT Applications

Applications of IoT can be utilized in various ways to assist systems and businesses in simplifying, improving, automating, and controlling processes. IoT can also be used for delivering important data, activity performance, or even environmental factors that have to be monitored continuously and remotely. IoT applications can therefore help with the creation of new systems and business strategies, as well as provide businesses with the instant data they need to create products and services.

3.1. Smart City

A smart city is a technologically advanced metropolitan region that collects information using different electronic techniques, voice recognition technologies, and sensors. The data is utilized to successfully handle assets, services, and programs; in turn, the information is being used to function smoothly throughout the city. Data obtained from community members, equipment, structures, and assets are processed and analyzed to track and maintain road and transport infrastructures, energy plants, utilities, water system connectivity, waste management, preventing crime, data management, education institutions, libraries, healthcare facilities, and other community programs. A smart city is a collection of different sensors and equipment to monitor, report, and process to manage the resources of the infrastructure effectively. Using the information gathered from the wireless sensors, the system will learn and make decisions to provide beneficial outcomes to the people. Compared to the healthcare, water supplies, and environment surveillance in the current urban areas, a smart city will be able to connect the citizens and the required services in a better way [45,46]. It is necessary to protect both the residents’ privacy and the information system’s integrity. Sensitive information is being gathered by sensing devices, which makes it vulnerable to cyberattacks.

3.2. Internet of Medical Things (IoMT)

The integration of health features into IoT devices makes the environment an IoMT. With the advancement of technology, the usage of IoMT devices is increasing. Moreover, the COVID-19 situation limits face-to-face meeting between patients and doctors. The pandemic has created a new era of IoMT for providing treatment to patients [47]. IoMT is making a network of people and medical devices (wireless medical devices and implanted medical devices). It utilizes wireless communication (Bluetooth, WiFi, 3G, 4G, 5G, ZigBee, etc.) to exchange health data with medical facilities like doctors, hospitals, medical experts, etc., [48]. With the advancement of microelectronics, medical devices have become intelligent and can monitor and report physical conditions such as blood pressure, heartbeat, oxygen level, etc. The devices can be placed in the body in the form of watches, belts, shoes, clothes, necklaces, etc., [49]. Moreover, IoMT has become the most significant change among the development in the medical sector as it brings not only the aged people but also every aged sick people in continuous monitoring and treatment. Especially people suffer even after recovering from COVID-19, and IoMT provides immediate treatment if necessary. Many healthcare systems from all over the world adopt the IoMT system to provide treatment. However, nearly 50% of IoMT equipment is susceptible to attack, as per the 2020 CyberMDX research. IoMT network is distinct from other systems in that they have the potential to impact patients’ lives and raise privacy problems if their identities are divulged [50]. Maintaining security and privacy is the primary concern of the IoMT system. According to a research from cybersecurity firm Critical Insights, cybersecurity incidents reached an all-time peak in 2021, compromising a record quantity of patients’ personal health data. Healthcare attacks harmed 45 million people in 2021, rising from 34 million in 2020. As per the research, the number of breached data has tripled within only three years, up from 14 million in 2018 [51].

3.3. Smart Grid

A smart grid is an electrical system that contains several efficient and energy efficiency features such as infrastructure for intelligent metering, intelligent power panels, smart equipment, control system, alternative/renewable energy, etc. The term “smart grid” refers to a concept that encapsulates the entire power generation and distribution system in a single frame. It is an electricity system built on digital technology that uses two-way digital communication to supply electricity to consumers. To put it another way, a Smart Grid is a grid that makes the entire system smarter or cleaner. Clean energy is presently in high demand all around the world. In 2003, the first time the term “Smart Grid” was stated by Michael T. Burr in an article [52]. Smart grid technology allows real-time monitoring, coordination, and control of the electric energy grid via communication networks between physical components, resulting in more effective and economical grid management. The widespread availability of Internet connectivity in most houses has made the smart grid more viable to adopt. The smart grid consists of Supervisory Control And Data Acquisition (SCADA), Energy Management System, Grid Communication Systems, and Distributed Energy Resources (DERs). In a smart grid system, users’ data privacy and security are crucial and challenging issues. A cyber-physical exploit is a safety failure in cyberspace that negatively affects a CPS’s physical environment [53]. There have been a number of significant cyber-physical incidents have been reported in the sector in recent years. A computer worm called “Stuxnet” leveraged four zero-day flaws and cryptographically signed certificates to evade intrusion detection. It hit the Iranian nuclear fuel enrichment complex in June 2010 where the programmable logic controllers (PLC) of the SCADA system were the targets [54]. Three Ukrainian electric power distribution firms were hacked in a coordinated operation in December 2015. Thirty substations were blacked out for almost three hours, resulting in 225,000 consumers experiencing wide-area power outages. To frustrate claims of disruptions, a telephonic DoS attempt was conducted while authorized members’ virtual private network accounts were stolen using the Black-Energy3 virus [55]. At present different AI based techniques are used to detect and defend the mechanism of the smart grid security system.

3.4. Internet of Vehicles (IoV)

With the development of industry, the number of vehicles is increasing rapidly. The increment of vehicles raises security concerns that trigger secure communication. IoV will lead industry 4.0. It is certain that the IoV will be bright and profitable in the future, offering improved road safety, reduced environmental effects, better space utilization, and cost control. The IoV, often known as smart transportation or connected cars, is a framework comprising vehicles, smartphones and wearables, roadside equipment, and a network. People, cars, and numerous IoT devices that are part of the transport system communicate over IoV [56]. Transportation, production, energy, software, and other industries are all affected. The IoV ecosystem includes hardware, software, services, and multiple network technologies ranging from Bluetooth and cellular to Wi-Fi and 5G, as well as several types of communication (V2V, V2X, and so on). Vehicle-to-vehicle and vehicle-to-infrastructure communication systems are combined to create the vehicular ad hoc network or VANET, and the term IoV has developed from the notation VANET. The combination of functionalities such as sensing units, control platforms, and various computer resources makes each vehicle in IoV an intelligent object. Each vehicle connects to any entity via a V2X communication architecture. The aim of IoV, also known as V2X, is safe driving by reducing accidents, alleviating traffic congestion, providing low traffic route information, and providing other information services. Every vehicle in the IoV network interacts with all other things that could have an influence on it. V2X mainly includes vehicle-to-vehicle (V2V), vehicle-to-sensors (V2S), vehicle-to-infrastructure (V2I), vehicle-to-network (V2N), and vehicle-to-pedestrian (V2P) communication. Nevertheless, roads can be seized by modifying or changing data or making wrong decisions due to the receipt of prank data [57]. To avoid these kinds of situations, it is required to develop a robust authentication framework that can resist security vulnerabilities and can conduct verification within milliseconds.

4. Devices’ Vulnerabilities and Requirements

Connected devices are suffering from different kind of threats, and it is increasing day by day. The low power devices can not satisfy the requirements of traditional methods to ensure safety. To preserve the security of the devices and the privacy of the consumers, it is essential to block the entry of adversaries into the devices or the network. In this section, the possibility of security threats and countermeasures will be illustrated.

4.1. Security Constraints

Applying the conventional security mechanics in IoT networks or devices is not straightforward as these devices are usually resource-constrained. The crucial security limitations of the IoT appliances are mentioned in Table 3 [58]:

4.2. IoT Attack Surfaces

With the growing number and variety of IoT devices, the attack surface multiplies many times. Furthermore, the attack surface of IoT networks is increasing with the raised population (number of IoT devices), convolution, heterogeneity, diversity, interoperability, portability, mobility, location, topology, and distribution of objects (devices, controller, connectivity, consumer, and services). The attack surface increases significantly as IoT device diversity and number increase. Additionally, the increased population (quantity of IoT devices), convolution, heterogeneity, diversity, interoperability, portability, mobility, location, topology, and dispersion of objects are all contributing to an increase in the attack surface of IoT networks (devices, controller, connectivity, consumer, and services). Enablers (such as networks and protocols) and entities make up an attack surface (i.e., devices, methods, and information). The attack surface is determined by the connectivity of a system’s components as well as policies that manage device permission for system access. IoT devices make several building blocks in the network of an IoT architecture. It is required to keep in mind different kinds of attack surfaces [59]. Administrative interface, device/cloud web interface, update mechanisms, mobile applications, physical interfaces, device firmware, device memory, etc., could be possible attack surfaces. An attack surface groups numerous locations an attacker can exploit to get access to a system and steal/leak/alter information. Behind each attack surface, there are particular elements and functions of devices of an IoT network where a set of security flaws lies. After identifying the attack surface, it is possible to identify security risks and potentially vulnerable areas where deep level protection is required. It is evident that the security of the IoT ecosystem is in the blink from various perspectives. The sheer amount of attack surfaces an attacker could use to carry out their harmful operations is undoubtedly a motivator to develop effective security solutions. Furthermore, due to the resource-constrained nature of IoT nodes, conventional security measures are unable to be implemented, putting the entire network in danger. The Mirai botnet and its derivatives, which can take control of IoT devices and launch a devastating DDoS attack, are excellent examples of such risks.

4.3. IoT Vulnerabilities

IoT devices are creating great experiences for consumers, and are everywhere around us. With the growth of IoT devices, security threats are also increasing as hackers are getting a chance to manipulate a huge amount of data in the vastly connected world. Without proper security in place, IoT devices will be vulnerable to sensitive data leakage. IoT and cybercriminal activity are invisible to the naked eye, and they can reach us anytime. Furthermore, IoT devices are vulnerable to assaults and security risks since they lack the essential built-in security to fight threats due to their low price, minimal power, and poor computing capability, as well as the network’s heterogeneity and scale. IoT devices are vulnerable to threats not only for technical aspects but also to users’ activity. Here are a few of the reasons why these smart devices are still at risk [60]:
  • Limited computing capabilities and hardware limitations: These devices are designed for particular applications that require only limited processing capabilities, leaving minimal area for security and data protection to be integrated.
  • Heterogeneous transmission technology: These devices communicate with different kinds of devices and frequently use various communication technologies, which make it difficult to establish uniform protection measures and protocols.
  • Components of the device are vulnerable: Millions of smart devices can be harmed by insecure or outdated fundamental elements.
  • Users lacking security awareness: Due to a lack of user security knowledge, smart devices may be exposed to risk zones and attack possibilities. Many IoT devices allow users to integrate third-party apps, which could also drive the device into a danger zone.
  • Weak Physical Security: Unlike data centers of internet services, not only just users, but also others with heinous intents, have physical access to a major share of IoT components.
In [61], the security issues are divided into Software level threats, and Hardware level threats, as shown in Figure 8. Hacking, information leakage, illegal access, and more. are defined as software level attacks to force the system to malfunction and collect desired information like credit card information, password, etc. A firewall, updated virus database, and up-to-date software usage can limit software-based attacks. Not only software-level attacks but also hardware-level attacks are prominent scope for attackers. To build complete secure hardware, secure Integrated Circuits (IC) or SoCs are required to develop. It is becoming complex due to nano-scale design, distribution of embedded Very Large Scale Integration (VLSI) chip fabrication, and also the incorporation of third-party Intellectual Property (IP) core. Insertion of a single malicious circuit during the fabrication process can make the system compromised, and this can be invisible to designers.
In Figure 9, the pyramid of threat factors is represented based on vulnerabilities and impacts [23,62]. The top elements of the pyramid are more vulnerable with minimum probable impact and lower-level elements show opposite characteristics. It can be asserted that Cyber threats seek greater control and opportunities further down the stack.
There are defects in a system’s component that render it vulnerable and expand the attack surface. In particular, an adversary tends to exploit the hardware or software of the IoT system to gain access to perform their malicious activity. In the report of HP, they found that 50% of the commercially available IoT has a significant security flaw [58]. It is essential to prevent and react against previously listed vulnerabilities as they could expose sensitive information and exploit the IoT system. Since IoT network is exposed to different kinds of attacks, it is a complex task for the security analysis and imposes full-proof security measures. Nevertheless, the massive volume of data generated by IoT environments is leveraging the enhancement of the security level of the entire system.

4.4. IoT Security Requirements

It is necessary to understand the security objectives to secure equipment. Confidentiality, integrity, and availability are known as the CIA triad as traditional security targets in the state-of-the-art. Confidentiality is linked to a set of rules that establish criteria for authorized entities who have access to information. Integrity is another characteristic that ensures reliable services so that only legitimate commands and information are being received by IoT devices. Availability ensures that IoT functionalities are accessible by legitimate objects and users anytime and anywhere. IAS-octave, alluded to the Information Assurance and Security, is a comprehensive set of security goals that eliminates the drawbacks of the CIA triad [63]. Table 4 lists the IAS-suggested octave’s security goals, as well as their meanings and abbreviations [64].

4.5. IoT Attacks

IoTs are subjected to various extensive threats and security vulnerabilities which raises the necessity to establish security frameworks in different domains, including identification/authentication, confidentiality, reliability, and non-renunciation. We will talk about security attacks based on distinct properties in this section.

4.5.1. Spoofing Attacks

A spoofing attack occurs when an attacker gains access to another device or user on a network. The adversary exploits the user’s device in addition to launching attacks against network hosts, stealing data, spreading malware, or getting around access controls [65]. In [66], spoofing attacks are distinguished into two types: (i) spoofing in the link layer: the whole communication between the two entities can be spoofed, and (ii) spoofing at the end to end layer: the attacker can counterfeit a certain service.
There are different types of spoofing attacks that can be initiated by attackers. Among different types of spoofing attacks, IP address spoofing attacks, ARP spoofing attacks, and DNS server spoofing attacks are some of the most frequent methods discussed here [67].
  • IP Address Spoofing Attacks: While a node communicates, it exchanges network data packets, each of which contains several headers for routing and transmission continuity. The ’Source IP Address’ header, for example, shows the packet’s sender’s IP address. In an IP address spoofing attack, an attacker falsifies the content of the origin IP header generally with random numbers in order to disguise itself. Most DDoS malware kits and attack scripts include IP spoofing as a standard feature. In two processes, IP spoofing attacks can make use of network traffic to flood targets. In one process, multiple spoofed addresses can be used to flood a selected target. This approach operates by sending more data to a target than it can manage. In another method, the victim’s IP address is spoofed, and packets are being sent from that address to numerous receivers on the network. When other nodes receive the packet, those will send a response to the target’s address, and the target will be flooded. Lack of controls against Denial of Service: Services can be targeted in such a way that they deny service to the entire network or device itself. The surface attack area is device network services for this case [68].
  • ARP Spoofing Attacks: ARP (Address Resolution Protocol) is a protocol that translates IP to MAC and vice versa, allowing network communications to reach a particular destination on the network. ARP Spoofing Attacks, also called as ARP Poisoning, involve an attacker sending forged ARP answers over a neighborhood region conducive to getting the IP address of a legitimate member of the network, which will be used to link with the attacker’s MAC address. After connecting the attacker’s MAC address to a valid IP address, the intruder will start to receive any messages destined for that IP address. An attacker can use this technique to intercept, manipulate, or even interrupt data in transit, allowing them to carry out other types of exploits like denial-of-service, eavesdropping, session hijacking, and man-in-the-middle attacks. Only local area networks that use the Address Resolution Protocol are vulnerable to ARP spoofing attacks [69].
  • DNS Server Spoofing Attacks: DNS stands for Domain Name System, and it is a system that converts website addresses, email addresses, and other human-readable domain names into IP addresses. In this attack, the attacker introduces corruption into the DNS resolver’s cache, which is utilized to redirect a given domain name to a different address, in this attack. The attacker’s server will be at the new IP address, including malware-infected files. Spoofing DNS servers is a common way for computer worms and viruses to spread [70,71].

4.5.2. Attacks Based on Access-Level

There are two sorts of attacks, active and passive, depending on the attacker’s level of access to the system [58,72,73,74].
  • Active Attacks: In this case, the adversary has the intention to cause disturbance among legitimate nodes by impersonating or manipulating the routing information.
  • Passive Attacks: In most cases, the intruder eavesdrops on the lawful transmitter’s and receiver’s communication in order to obtain the communicated data.

4.5.3. Attacks Based on Transmitting Data

IoT devices employ sensors to detect and collect information about their surroundings. These sensors are susceptible to a number of concerns, including injecting fake sensor patterns or initiating commands to launch malware that has been placed in the device of a victim [75]. Attackers can leverage unintended communication channels between device peripherals to change important sensor settings (e.g., device mobility, temperature, pressure, light intensity, magnetic field, etc.) or send malicious instructions.
  • Transmitting via Light Sensors: One of the methods to compromise signals and send malevolent signals is light sensors which makes it simple to transmit data packets by turning on and off a light source. The difference of light intensity will act as a source of the device’s data flow. An adversary can activate malware by delivering a trigger message by regulating light intensity, i.e., adjusting the voltage of a light source.
  • Transmitting via Magnetic Sensors: The functionality of a magnetic sensor depends on the magnetic fields of the surroundings of the device. It will be affected if there is a change in the magnetic fields of the device’s peripherals. To send data using magnetic sensor, permission from users is not required and can be silently run in the background [76]. An attacker can make forged data of the magnetic sensor by shifting the magnetic field of the atmosphere of the device. This action can ultimately trigger messages of malware. Triggering signals encoded by an electromagnet can be communicated to an IoT device, and this message will cause certain variations in the device’s magnetic sensed data. The triggering message can be derived from this electromagnetic signal by calculating differences.
  • Transmitting via Audio Sensors: Malware in IoT devices can also be activated using audio sensors. Microphones in modern IoT devices may identify audio signals with a frequency relatively lower than the audible frequency range, and triggering messages can be sent using this type of audio signal to get over the device’s security measures.

4.5.4. Attacks Based on Device Property

IoT devices are divided into two categories based on their device properties: low-end devices and high-end devices. Each kind of attack has a different level of effect on the devices. In these attacks, IoT devices might result in unusual behavior, or the device can be out of functionality [23,77].
  • High-end device class attacks: In high-end device class attacks, powerful devices with high processing capability launch attacks on the IoT network. Between comprehensive devices and the network, the internet protocol is utilized. The attacker uses the high processing power of the CPU of the powerful devices, e.g., laptop, computers, to connect with the IoT network to launch an attack from anywhere and anytime [78,79].
  • Low-end device class attacks: It can be identified from the name of the attack that this attack involves low power and energy consumption devices to introduce an attack. The devices which are used in this attack can make a connection between the system and outside using radio links. A smartwatch, for instance, can be coupled to intelligent devices such as a smart TV, smartphone, smart refrigerator, smart temperature controller, and smart surveillance camera in a smart home system. It can also control the functionalities and configurations of these devices. Nevertheless, the smart home system can be under attack by low-power IoT devices like smartwatches [80,81].

4.5.5. Attacks Based on Adversary Location

An intruder can launch an attack on an IoT system at any time and from any location. Someone from inside and outside can initiate an attack [23,77].
  • External attacks: Most external attacks happen with the aim of stealing the private data of users using malware such as worms, Trojan horse viruses, phishing, and the like. A hacker can gain control of the IoT device that is located anywhere on the IoT network. Without prior knowledge of the architecture of the network, the adversary tries to get access using a trial and error process. He will try until his attempt is successful.
  • Internal attacks: An insider threat is someone who is a legitimate user of a network, system, or can access data and deliberately misuses it, or whose access leads to abuse. In this example, the attacker gains access to a component within the security IoT border and runs malicious malware against IoT devices. Compromised actors, unintentional actors, emotional attackers, and technology perception actors are the four categories of internal attacks.

4.5.6. Attacks Based on Attacks Strategy

To initiate an attack, the intruder follows a strategy to insert and run his designed malevolent code in an IoT device to disrupt the IoT network. The attacker’s strategy can have two view aspects: physical or logical [77].
  • Physical attacks: To carry out this method, the attacker must have direct access to the IoT network’s infrastructure. The adversary can disturb a partial or full IoT network by changing the instruction or structure of the system.
  • Logical attacks: Contrary to physical attacks, in logical attacks no physical access is required. Attackers do not cause any damage to the device physically; instead of this, the attacker makes the communication channel dysfunctional.

4.5.7. Attacks Based on Information Damage Level

Sensors monitor and collect information from IoT devices. Attackers can change the information easily, which is fluctuating and open. Based on modifying the level of information by attackers, it can be divided into six categories [77].
  • Interruption: An interruption attack is an attack that creates an obstruction of any kind during the communication process between one or more systems. As a result, resource exhaustion is one of the outcomes of an interruption and the systems, which are under attack by illegitimate users, become unusable which results in the system being in shutdown mode.
  • Eavesdropping: When a hacker uses unprotected or insecure data transmission to steal data shared or communicated through electronic devices, the attack is known as an eavesdropping attack. A sniffing or snooping attack is another name for it. In this attack, there are no anomalies in the network communications themselves, which makes the probability of this attack higher. IoT systems’ confidentiality breaches when there is an eavesdropping attack.
  • Alteration: As the name suggests, in this attack the message which is sent by the sender is altered and transmitted to the destination by an unauthorized user. The integrity of the message and security requirements of the system is threatened by this type of attack. The receiver receives the exact message that an attacker is wanted to send. It will result in the poor performance of the network. To deceive the communication protocol, the adversary does it in an undisciplined manner.
  • Fabrication: In this type of attack, an intimation data is inserted into the network by an unauthorized user as if it is a valid user who threatens the authentication of the IoT system. As a result, the message’s confidentiality, authenticity, and integrity are compromised.
  • Message Replay: A replay attack (also known as a playback attack) is a type of network assault in which genuine data is captured, and the original message is resent or delayed in order to breach the target IoT devices. The IoT recipient device will be confused by a replayed message, which could harm the IoT system. This is one of the lower-tier variations of man-in-the-middle attacks.
  • Man-in-the-middle: As the term implies, an attacker stands between the transmitter and the recipient; the attacker relay and possibly alter the communication between two parties, and the attacker collects information from the communication channel. Two parties feel they are conversing directly with each other in this situation.

4.5.8. Host-Based Attacks

This form of attack targets the host’s resources, such as people, software, and hardware. OS and system software or applications are embedded into IoT devices. So, it is possible to attack IoT devices through the host of the IoT system. The adversary is presumed to have gained access to the victim in this exploit. Hardware-based attacks, software-based attacks, and user-based assaults are the three types of host-based attacks. The attacker compromises these resources and each categorized attack has a different impact on the IoT network.
  • Software-based attacks: Software can be compromised by an intruder to push the IoT device into a vulnerable state. An attacker can drive the device into an exhaustion state or resource buffer overflows by host-based attacks. For example, by compromising the sleeping mode, attacker can cause a sudden shutdown of the device due to low battery which breaches the interoperability of the system.
  • Hardware-based attack: In this type of host-based malfunction, an intruder compromises hardware by cloning/tampering. Attackers steal actual driver, theft data by connecting to a device and injecting malicious code. For example, using an illegitimate charger which transfers malicious code along with charging, a smartphone can be exploited.
  • User-based attacks: Sometimes, a user intentionally or unintentionally shares confidential data such as credentials (e.g., password, security, etc.) keys related to security. For instance, a user writes down a password in a file that is accessed by an unauthorized user who will be able to access the IoT devices [82].

4.5.9. Protocol Based Attacks

In a protocol-based attack, the attacker can steal or change information by deviating or disrupting the deliberate protocol [58].
  • Deviation from protocol: The attacker impersonates a legitimate user and injects malicious code into the IoT system, causing it to deviate from the protocol. Application and networking protocols are the protocols where attacks happen to make a deviation from the protocol.
  • Protocol disruption: The availability is one of the security characteristics in the context of IoT security. It is important to have functional security to make a reliable IoT system. However, attackers can disrupt IoT networks from both inside and outside the network, putting the network’s availability in jeopardy.

4.6. Classification of IoT Security Attacks on Different Layers of IoT Networks

Cybercriminals look for device vulnerabilities and exploit them to gain an advantage in conducting attacks, reinforcing the need for security from the start. Cyber attackers can challenge an IoT application in a variety of techniques that fall into four categories: physical or perception, network, software or application, and encryption attacks. Physical, network, and application-based attacks on an IoT system are all possible, as are attacks on encryption techniques. The classification of security threats on different layers of IoT networks is shown in Table 5.

4.6.1. Physical Attacks

These attacks result from breaches to the IoT system’s equipment, such as the IoT device’s sensors, and attackers gain access through proximity, like inserting a USB drive. According to estimates, 70% of all cyberattacks start from the inside, whether deliberately or accidentally by humans. This attack can limit the lifetime or functionality of the hardware. We will discuss these attacks here.
  • Node Jamming in WSNs: A node jamming attack in WSNs is carried out by malicious nodes in the network, which interfere or disrupt or jam the radio signals used by sending useless information on the frequency band used [83]. An attacker can expel the service of the IoT device if the attacker can manage to jam the key sensor. In the case of a jamming attack, the statistical features (for instance, mean and variance) of a packet flow will fluctuate temporarily. Depending on its strength, a jamming source may be able to take down the entire system or only a small piece of it. This blocking can be temporary, periodic, or permanent.
  • Physical Damage: A physical damage attack is an attack that results in physical damage to the targeted infrastructure. The attacker can gain access to the devices by physically damaging entities of the IoT network to serve his interest. This type of attack can be avoided if the protection of the zone where IoT devices are located is strong [84].
  • Node Tampering: A node tampering attack is an attack where an adversary damages a sensor node. The entire sensor node can be replaced, or a part of the hardware can be compromised. A compromised node can be created by altering or replacing a node, and the attacker can control that node. By getting access, an attacker can alter sensitive information, for example, shared cryptographic keys/credentials (if any) or routing tables or other data, as well as disrupt the functionality of higher communication levels [20,39,79,85,86].
  • Social Engineering: In social engineering attacks, malicious activities are accomplished through human interactions [87]. Social engineering is the psychological manipulation to trick users of an IoT system into performing certain actions or giving away confidential information that would serve their goals. Social engineering attacks may involve one or more steps. An attacker begins by gathering the background data needed to carry out the attack, such as potential avenues of entry and inadequate security procedures. The attacker then goes about gaining the victim’s trust, providing encouragement for additional behaviors that breach security principles, and obtaining the necessary information.
  • Malicious Node Injection: In this attack [84], the attacker physically deploys a malicious node in the IoT network, which gathers information for the attacker or modifies the communication data to pass wrong information to the other nodes. Hence the attacker controls the transmission and reception of data flow and, finally the operation of the nodes.
  • Sleep Deprivation Attack: The IoT devices are programmed to follow a sleep routine to remain in a low power mode for as long as would be possible without adversely affecting the node’s applications; hence it extends its battery life. The computing devices, such as a sensor node, which are powered by a battery, are susceptible to sleep deprivation attacks [88]. The attacker interacts with the node in such a way that appears to be permitted; however, the intention is to keep the victim node active which will lead to higher power consumption and become out of order [88].
  • Malicious Code Injection/Forgery Attacks: The attacker attacks the device physically and injects malicious code to compromise the system and gain access. This can be done by inserting a USB with a malevolent program onto the node or by inserting communication links using methods such as (1) inserting malicious codes/data packets which seem legitimate; (2) modifying codes/data packets after capturing; (3) replacing the previously exchanged messages between nodes. The purpose of a malicious code injection attack could be various, e.g., to steal data, get control of the whole or partial system, and propagate worms [86,89,90].
  • RF Interference on RFIDs: RFID is an auto-identification technology where communication is done using radio frequency (RF) with an identification code (ID). In this attack, the signal is compromised by creating and sending noise signals over the RF signal, which is being used for the communication of RFIDs. The noise will cause disturbance for RFID signals [91,92].
  • Tag Cloning: In a clone attack, the attacker wants to have a tag that will have the same characteristics as the original tag and eventually can replace it [93]. In this attack, an attacker will be able to copy information of an RFID electronic tag or smart card to a cloned tag through reverse engineering or directly from its deployment environment. Sniffing, eavesdropping, and other technologies are used in clone attacks to get all of the data from the original tag, including encoding and customer information. It can copy all of the data to an RFID tag that can write to the entire region and replicate the tag [94,95].
  • Eavesdropping: An eavesdropping attack, also known as a sniffing or snooping attack, is information thievery as it is transmitted using wireless communication. To eavesdrop, an attacker can use an antenna to get communicated data in an RFID system [96]. To be successful, an attacker finds a weak connection so that he can exploit it to reroute network traffic [97].
  • Tag Tampering: In a tag tampering attack, the attackers’ aim is to alter the tag’s identity. The attackers can counterfeit a tag in an RFID system by using the method of tag manipulation. The attackers will get access to the communication channel by tampering the tag of an IoT device [63,98].
  • Outage attack: An attacker sometimes can use more power than the allowed range or turning power of a group of objects which are placed in unattached environments. This operation will make the devices out of order [63,73].
  • Object replication: As IoT devices are not monitored physically in remote places, an attacker, in this type of attack, can physically insert a new device/object into the network. For instance, a malevolent object could be added by replicating the object’s identity. As a result, such an attack could result in significant network performance degradation. Aside from degrading performance, the malicious object can simply corrupt or misdirect received packets, giving the attacker access to sensitive information and extracting secret keys [85].
  • Hardware Trojan: A hardware trojan attack has been identified as the prime security issue in an integrated circuit in many different forms of research. Like other attacks, the aim of the attacker is to gain access and collect confidential information and firmware. In this attack, the adversary maliciously modifies the integrated circuit. The hardware trojan attacks are planned during the design phase and remain inactive until the designer sends it a trigger or an event [20].
Here we will show countermeasures against physical attacks. Table 6 shows physical attacks with compromised security goals and countermeasures [11,63]. Here, we are refereeing to compromised security requirements from Table 4’s abbreviation.

4.6.2. Encryption Attack

Encryption attack is of making vulnerable to the encryption scheme which is being used in the IoT system.
  • Man in the Middle Attack: The man-in-the-middle attack is a cyberattack where the attacker takes a position between two users on the communication line and shares keys with both users. The adversary can intercept the signal that both users are sending to each other and can encrypt or decrypt data with the keys that he shares with both of them. An attacker can also alter the communications between two parties without their knowledge who think that they are sending data to each other [120].
  • Side-Channel Attacks: Physical characteristics of IoT devices (e.g., power consumption, execution time, electromagnetic leaks, system fault, etc.) can reveal sensitive information. During the execution time of IoT devices, the intruder performs different tests to extract confidential information. Sometimes it is required to have technical knowledge of the inner working principle of the system, which will be exploited. In public-crypto systems such as RSA, extracting information from the device’s behavior is common [23]. RSA performs encryption and decryption of messages using private and public keys based on modular operations and large exponential values. The simple multiplication method is applied to modular operations, whereas the modular operations method is used on large exponential values. The attacker performs delay analysis to get how much time is required for calculating exponential results. Attackers can obtain private information like private keys by learning the computation time and using knowledge of the implementation technique. Most IoT devices will implement security measures like encryption to protect their sensitive information for security reasons. However, by performing a side-channel attack security mechanism can be broken.
  • Cryptanalysis Attacks: The attacker in a cryptanalysis attack studies ciphertext, ciphers, and cryptosystems with the purpose of finding the encryption key being used by breaking the encryption scheme of the system. The attacker breaks cryptographic security systems and gets access to the encrypted messages, even without knowledge of the plaintext source, encryption key, or the algorithm used to encrypt it [121]. Secure hashing, digital signatures, and other cryptographic algorithms are also the targets of this attack. Based on the methodology used, there are different types of cryptanalysis attacks.
    -
    Ciphertext Only Attack: The attacker determines the plaintext accessing the ciphertext.
    -
    Known Plaintext Attack: The aim of this attack is to get ciphertext using plaintext. The attacker decrypts the ciphertext using the known parts of the ciphertext.
    -
    Chosen Plaintext Attack: In this attack, the attacker can choose plaintexts that are encrypted and find the encryption key.
    -
    Chosen Ciphertext Attack: Similar to a chosen-plaintext attack, an attacker gathers information by obtaining the decryptions of chosen ciphertexts. By utilizing the plaintext of chosen-ciphertext the attacker can find the hidden secret key used for decryption.
Now we discuss encryption attacks and corresponding countermeasures. Table 7 shows encryption attacks with compromised security goals and countermeasures [11,63]. Here, we are refereeing to compromised security requirements from Table 4’s abbreviation.

4.6.3. Network Attacks

These attacks are focused on the network of IoT systems to extract large amounts of data remotely [97].
  • Traffic Analysis Attacks: Unlike eavesdropping attacks, the attacker does not need to compromise the original data, whereas the attacker listens to the network to gain some information using sniffing applications such as port scan, packet sniff, etc. Like eavesdropping attacks, in a traffic analysis attack, the adversary hears the communication flow of the network to analyze traffic to find critical nodes’ locations, the routing diagram, and even application patterns of behavior. Once an attacker reveals the required information, s/he can accurately host attacks like jamming, eavesdropping, sybil, etc., [126,127].
  • RFID Cloning: Making a replica of a user’s RFID without knowledge is another way to overthrow RFID access systems. Even without accessing physically to the RFID card, an intruder can clone an RFID tag by copying data from the victim’s RFID tag onto another RFID tag [96]. The attacker can get the information and write the data to a similar blank RFID using off-the-shelf components by standing several feet away [128]. The integrity of the system will be violated as cloning results circulation of identical tags.
  • RFID Spoofing: Unlike RFID cloning, in an RFID spoofing attack, an attacker does not physically replicate an RFID tag. Technically, cloning and spoofing attacks are made back-to-back. In this type of attack, an adversary impersonates a valid RFID tag to gain its privileges, reads, and records a data communication from an RFID tag. The attacker can obtain complete control of the system by posing as a legitimate source and sending his own data that includes the authentic tag ID. Spoofing attacks take place when a hacker successfully makes a position as an authorized user in the system [96,129].
  • RFID Unauthorized Access: Different levels of security features can be available in RFID. If proper authentication mechanisms are not deployed in the RFID system, tags can be accessed by an attacker. The attacker can simply read, edit, or even destroy data on the RFID devices for his own gains. The attacker needs to execute complicated steps if strong level security measures such as access to the backend are required to retrieve the necessary credentials [130].
  • Man In the Middle Attack: A perpetrator positions himself in an interface between two sensors, collecting private data and invading privacy by eavesdropping or impersonating one of the clients so that it looks like a normal information flow is taking place. The goal of this attempt is to obtain personal information that can be utilized for a variety of things, such as identity theft, unauthorized financial transfers, or unauthorized password changes. This attack relies exclusively on an IoT system’s network communication protocols. Therefore, physical presence is not necessary [94,131,132].
  • Denial of Service: To carry out a successful denial of service attack, the attacker floods the IoT network with a large number of requests, resulting in a significant quantity of data traffic; this continues until the target cannot respond or simply crashes. In this attack, legitimate users are unable to use network resources to access information as all available resources are exhausted, which makes network resources unavailable to users. Moreover, many users’ unencrypted data can also be exposed [133,134].
  • Sinkhole Attack: In a sinkhole attack, an adversary deceives the system by luring all data flow from neighboring WSN nodes into a metaphorical blackhole; the system is fooled into believing the data has already arrived its endpoint. The attacker uses a compromised node to attract network traffic by transmitting fraudulent routing information. The goal of the attacker is to breach the system’s integrity as well as disrupting network service. It prevents all packets from transferring, resulting in a sink or black hole in the network [135,136].
  • Routing Information Attacks: In a routing information attack, the adversary uses a compromised node or a group of compromised nodes to make or change the routing information. The purpose of the attack is to obfuscate the system and make routing loops, permit or reject traffic, change the destination, provide fake error messages, shorten or extend source paths, or even partition the network; e.g., Hello Attack and Blackhole Attack [84,137].
  • Sybil Attack: Sybil attacks are more common in networks with a large number of clients. A single node that unlawfully acquires the identities of numerous other nodes is referred to as a malicious node. The attacker uses the identities of the other nodes, causing the adjacent nodes to receive phony and incorrect information. The attacker can part in the distributed algorithm, such as the election where one sybil node has an identity more than once. It can also be selected as a part of the routing path, which can lead to a longer routing distance [138,139,140].
  • Replay Attack: Attackers get information by eavesdropping on the messages of two parties, and the malicious node resends old packets to the overall system as broadcast or sent to a specific set of devices. When the other nodes receive these messages, they update their routing tables according to this expired information and reply regardless of whether the sender is transmitting any new packets or not. The Routing table and network topology will also be outdated, and with a huge number of packets replayed, both bandwidth and power will be consumed. This will result in the network’s activities being terminated sooner than expected, facilitating the impersonation attacks [20,86].
  • HELLO flood attack: Some WSN routing protocols broadcast the “HELLO” packet to advertise themselves to their neighbors and construct a network topology. The attacker does not need to send legitimate traffic to conduct this attack. It can subsequently re-broadcast overhead packets with sufficient strength to deliver to every other network interface, leaving the network in disarray [141]. Though the malicious node is far away from network nodes, every node in the network will be convinced that the attacker is nearby. The majority of protocols that are impacted by this kind of attack depend on nearby nodes exchanging localized information to maintain topology or control flow.
  • Blackmail attack: In the blackmail attack, a compromised node eliminates a legitimate node from the network by proclaiming that the legitimate node is a malicious node. If a compromised node is able to block a large number of nodes, the network will become unstable [142,143].
  • Blackhole attack: In this attack, a malicious node, instead of forwarding all the packets, may drop those, and it may drop all the data traffic around the malicious node. This attack is also referred to as “Selfishness”. Its impact is highest if the malicious node is a sinkhole [110].
  • Wormhole attack: A wormhole attack necessitates the collaboration of two or more adversaries with excellent communication resources (e.g., power, bandwidth) and the ability to construct better communication lines (called “tunnels”) between them. Malicious nodes are not clustered together; instead, they are carefully located at opposite ends of a network, where they can get messages and replay them in separate portions via a tunnel. Other nodes use the tunnel as their communication path and go under the scrutiny of the adversaries [144,145,146].
  • Grayhole attack: A grayhole attack is an alternate form of a blackhole attack. The difference between blackhole and grayhole is dropping packet count. Instead of dropping all the packets like a blackhole, grayhole drops those packets it selects [110].
Here we will present countermeasures against network attacks. Table 8 shows network attacks with compromised security goals and countermeasures [11,63]. Here, we are refereeing to compromised security requirements from Table 4’s abbreviation.

4.6.4. Application Attacks or Software Attacks

Software or application is the fourth factor that increases the danger of IoT security. Malware is introduced into the network’s application to start this attack. This malicious program can disrupt and monitor operations, spread viruses, corrupt or steal data, and more.
  • Virus and Worms: A virus is a small, self-contained computer software that can replicate and infect other computers in the same way that a real virus can. A virus is just one sort of “malicious logic” that can maltreat an IoT network. A computer worm is similar to a virus in that it spreads by itself rather than being disguised inside another software [170].
  • Malicious Scripts: Usually, there is an internet connection in the IoT network. In this attack, an attacker fools the user, who controls the gateway, by visiting lucrative advertisements or websites and then running executable active-x scripts with malicious alterations to different parts of the system, which could lead to the system being shut down or data being stolen [171,172].
  • Spyware and Adware: To propagate malware and harmful code, adversary attacks devices, such as IoT, use factory default user credentials, password brute-forcing, breaches, and manipulating weak configurations. Once the attacker has complete control, he can launch a DDoS assault against a target. A malicious party could insert harmful software into the system, which can result in data theft, data tampering, or even a denial of service [173].
  • Trojan Horse: A Trojan Horse camouflage is a legitimate program where some previously defined event or date is present. This attack is triggered in the pre-set condition and then delivers a payload that may completely shut down the system [174].
  • Denial of Service: An attacker can use distributed DDoS and DoS attacks to prevent users from accessing a system or network resource. This attack undermines the network or systems’ capacity to perform expected functions. This attack comes from numerous points, and it is difficult to defend against this attack [175].
  • Distributed Reflection Denial of Service Attack (DRDoS): DRDoS is one form of DDoS attack. In this attack, an attacker preserves anonymity through an IP address by using a third party, called a reflector, which needs not be compromised [176]. Numerous victim machines that unintentionally take part in a DDoS attack on the attacker’s target are typically used in DRDoS attacks. Requests sent to the victim host computers are reflected back to the target from the victim hosts. The attacker sets the target’s IP address as the source IP address to the reflectors to flood the network with response packets. They typically also generate an increased volume of attack traffic [177]. The advantage of the attack is that the attacker’s identity will not be revealed as the attack will be done by reflectors, not by the attacker, which makes it hard to identify the original attacker and block the service. Another benefit of the DRDoS attack strategy is amplification. An attacker’s first request results in a response that is greater than what was sent when there are numerous victim servers involved. This increases the attack bandwidth and the likelihood that a denial of service outage will result from the attack. DNS, NTP, SNMP, and SSDP are the protocols for UDP-based DRDoS attacks; SYN and BGP are the protocols for TCP-based DRDoS attacks [178]. Firewalls, intrusion detection systems, machine learning, etc. can be used to mitigate DRDoS attacks [179].
  • Firmware Hijacking: Hardware’s fundamental component is firmware. Every piece of hardware on a computer has this basic software preinstalled. Firmware modification or hijacking attack is one of the most catastrophic attacks where attackers can gain control of the entire system. It has already impacted various embedded systems such as telecommunication infrastructure, SCADA, and PLC systems [180].
  • Botnet Attack: The botnet is a phrase derived from the concept of bot networks, where a bot is a computer program or robot that is automated. A botnet is a robot network. Usually, an attacker gains control by spreading a virus or other malicious code to take over a network of devices to create a botnet. This is not a malware attack, although it is carried out through compromising devices. An IoT Botnet is also a network of various malware-infected IoT devices, such as routers, wearables, and embedded technologies. This malware allows an attacker to control all the connected devices and eventually the network [181,182].
  • Brute Force Password Attack: Brute force password attack or BFA is a search and find a method to gain privileged access where the attacker guesses possible combinations of a targeted password until the correct password is discovered [183]. Based on the length and complexity of the password, both time and the applied combination will be required. BFA is a password research technique that uses a variety of probable ASCII characters, either alone or in combination.
  • Phishing Attacks: In this attack, the attacker gets private data like usernames, and passwords by email spoofing and phishing websites [184,185].
Here we will show countermeasures against application or software attacks. Table 9 shows application attacks with compromised security goals and countermeasures [11,63]. Here, we are refereeing to compromised security requirements from Table 4’s abbreviation.

5. Security Mechanisms

In general, the two approaches for protecting IoT and IoE devices from potential intrusions are software-based and hardware-based. Software is responsible for protecting devices against software-based attacks. It is tough to break the mathematical algorithm of software using the present computer system. However, it will be able to solve mathematical keys within a shorter time compared to the current approach when quantum computers become reality [199]. In software-based security solutions, devices are prone to attack as keys are saved in the non-volatile memory (NVM) of the devices. The invention of quantum computers might make software-based security solutions vulnerable. Therefore, the hardware-based solution could be one of the possible solutions due to the risk factor of existing software-based security [23]. This is accompanied by the prediction that the majority of current asymmetric cryptography will be broken by the advent of quantum technology employing Shor’s Algorithm [200]. Winternitz One Time Signature (WOTS) Scheme [201], Supersingular Isogeny Diffie–Hellman Key Exchange (SIDH) [200], etc., are post-quantum resistance. It is required to standardize a model to preserve integrity. NIST is working to standardize cryptographic mechanisms to resist attacks on the post-quantum area. Figure 10 shows hardware-based security mechanisms.
Cryptographic functions can be used in hardware-based security by using a dedicated hardware-integrated circuit or chip to store the keys. Physical computing devices called hardware security modules can be utilized for crypto processing and robust verification. They can encrypt, decrypt, save, and handle digital keys using various encryption algorithms, as shown in Figure 10 [202]. (1) a public key and (2) a private key; these two keys are carried by each node in the network. Man-in-the-middle attacks are easy to launch using this hardware-based security mechanism. Attackers can clone the device after stolen. PUF is a solution to avoid the attack [203,204]. Gassend et al. first introduced PUF as a security primitive for hardware-based security [205]. PUF can produce digital fingerprints on the fly when requested. PUF produces a different key (Response) when different input (Challenge) is fed to the device, which is due to manufacturing variation of the chip [206,207]. Now, the characteristics of PUF will be discussed. Figure 11 depicts the characteristics of PUF [208,209].
  • Uniqueness: It is required to have different responses for each challenge. It is determined by how distinct one chip is from another in terms of strings and ultimately process variation of PUFs. Hamming distance (HD) calculated with each response represents uniqueness. The number of bit differences between the two responses calculated the HD. Ideally, uniqueness should be 50%.
  • Randomness: It is calculated based on the total count of “1”s and “0”s of a response. In response, it is expected that the presence of an equal number of “1”s and “0”s. If so, the PUF will have 100% randomness.
  • Correctness: A PUF needs to generate the same CRP irrespective of external variables such as temperature, pressure, time, etc. In every operating condition, the ideal value is 100%.
  • Reliability: A PUF, as the name implies, should be 100% reliable. Every time a challenge is presented, an ideal PUF will produce the same response.
  • Uniformity: This measures how random the PUF is. The probability of “1”s and “0”s should be equal so that any intruders are unable to guess.
  • Bit Aliasing: How a particular response bit across several chips are measured by bit aliasing, and the ideal value is 50%.
  • Steadiness: All the responses should be identical when the same challenges are feeding to a PUF. Ideally, the value of intra-HD should be 0%.
PUF includes ring oscillator PUFs, Arbiter PUFs, Optical PUFs, SRAM PUFs, DRAM PUFs, and MRAM PUFs, among others.
Blockchain is a distributed, immutable, decentralized, and shared digital ledger that can be used in IoT and IoE networks to provide security [210,211]. There is no centralized entity to govern the data, and it is a peer-to-peer connection, unlike other systems. All nodes in the network come to a consensus to verify transactions and store the data in a block with a timestamp after the completion of the mining process by the miner node. The blocks create a chain which is called blockchain, and it uses SHA-256 and ECC for data integrity and authentication. Figure 12 shows the basic structure of a block in blockchain [212,213]. Each block stores timestamp, transactions, and previous block hash along with others’ attributes. It is very tough to alter data in blocks as each block is connected by a hash.

6. IoT Security Solutions

This section will evaluate security measures for the IoT network based on published literature. The best understanding is used to present each design.

6.1. PKI-Based

Guo et al. in [214] proposed a scheme to provide security for big data collection in large-scale IoV. Mutual authentication and single sign-on-based authentication schemes were developed for collecting big data in a secure way. It assumes that each vehicle is loaded with a certificate by a certificate authority before registration. During registration, if the certificate is valid to the data center, it will be registered as a valid account, and a private-public key will be issued. It uses sign-on to start data flow. If the message is from a valid account, then a session key will be generated. The private-public key with a signature is used for encryption. If it passes the RSU area, then it needs to update the session key with the new RSU. If RSU finds the signature of the data center and ID in the certificate and also receives within the expired timestamp, then RSU will update the session key. It does not hide the ID of the vehicle. After changing the RSU area, a forgery vehicle can login using a fake certificate.
In [215], Li et al. proposed a certificateless conditional authentication protocol to avoid the storage of certificates in TA and vehicles. Each vehicle has two unique tags which are linked with its secret key. Instead of using the secret key directly, two random values are used with the secret key to make the message unlinkability. It uses the discrete logarithm (DL) problem [216], and computational Diffie–Hellman (CDH) problem cryptography algorithm [217] and it assumes that the DL problem is intractable. In future work, they will work to remove vulnerabilities and limitations of this work to achieve security and privacy requirements and incentivize the participants.
Kerrache et al. proposed a solution based on the social network in [218]. It will calculate trust values based on online social networks for drivers and passengers. It also takes into account inter-devices authentication for in-vehicle, inter-vehicle trust calculation based on trust ratio, and also RSU trust calculation for each vehicle by getting recommendations from neighbor vehicles regarding a vehicle. Furthermore, it takes into account followed path by users and current mobility. It uses Chaotic map-based Chebyshev polynomials for computing security keys for inter-devices authentication, and social network trust is identified using the Advogato trust metric. The human honesty factor will be required if nodes’ behavior is unclear/compromised. This scheme required trusted third parties such as social network platforms, network providers, etc. It introduced delay to compute human factors and location-related trust.
Al et al.’s work [219] shows secure performed enriched channel allocation, i.e., shared channel, using commutative RSA (CRSA) [220]. In the CRSA scheme, two prime numbers are required to be sent to all vehicles using random number encryption and decryption parameters, which will be generated, and it is required to exchange keys to each vehicle. Data will be sent to the destination vehicle after encrypting in several vehicles by their keys, and the destination vehicle will decrypt the data using each vehicle’s keys.
Meshram et al. [221] also proposed a secure smart city communication protocol using a smart card, password, and extended chaotic maps. The protocol used random number with Hash functions (31 times) to make it lightweight. It contains processes to change password and revocation of smart card. If the smart card is stolen and the attacker can guess the online password through the side-channel attack, the smart city could be compromised.

6.2. ABE-Based

In [222], Han et al. proposed a ciphertext-policy attribute-based encryption (CP-ABE) system to protect communication. It uses a max-miner association rules algorithm to mine the frequency features to build frequent item sets. The ECU can access and decrypt the data if it has the same set of frequency attributes. To improve speed, it uses symmetric encryption in the registration stage. A secret key that is used for decryption is generated using the keygen algorithm, which takes frequency attributes as input. It only works with the same attribute sets. There could be a chance of a major attack if one ECU is compromised where an adversary can get the algorithm for a specific attribute set.
Hwang et al. [223] proposed a CP-ABE-based authentication framework for the healthcare sector. The protocol identifies which device received the first key (by the collaboration of attribute authority and trust authority) to identify the root cause of vulnerability. The length of the ciphertext is independent of the number of attributes, resulting in the same decryption time irrespective of the number of attributes. However, the proposed approach necessitates a significant amount of computation in order to validate the user’s identification. PHI leaking from the client who got the delegated key is likewise a problem.

6.3. ECG-Based

Huang et al. [224] proposed an ECG-based [225] authentication protocol for the IoMT application that uses Singular Value Decomposition (SVD) to de-noise signals of ECG. Interference will be decreased depending on the movement situation and pre-defined attribute frameworks. In the instance of gentle exercise, a de-noise signal was produced using weighted online SVD. Running and walking requires a lot of angular distance; additionally, different activities require different routines or stances. In this study, it was assumed that the adversary had no insight into the patient’s ECG template.

6.4. MAC-Based

Siddiqi et al. proposed a MAC-based [226] authentication system in [227] for the medical sector. The designed framework was a smart card and IoMT device authentication system based on public-key cryptography. The absent k-bit in the server’s shared hash function must be calculated and identified by the user device. However, the suggested approach lacks user anonymity.
In [228], Hahn et al. highlighted the security flaws of MAC-based and commitment-based authentication protocols (where a value will be used rather than a range). They presented a technique to improve the system in which a key server generates commitment keys and verification keys. After calculating a commitment value with those keys, the client will transmit the message. To validate the commitment key, the specialist will use the commitment key and the verification key to decrypt the partially decrypted content.

6.5. ECC-Based

Fog server-based authentication scheme is developed by Wazid et al. in [229]. Secret information is stored in the memory of RSUs, Vehicles, and fog servers from TA. It uses ECC-based key management. It uses XOR and hash operations for developing the authentication. To replace compromised nodes, it has a phase of dynamic node addition.
Wu et al. proposed an ECC encryption-based batch verification algorithm that has the main objective of reducing verification time [230]. It has been found that in this batch verification scheme, ten times less time is required compared to RSU only verification. When traffic is higher, then RSU allocates assistance verification terminals (AVT) based on computational power and network traffic. After verification, AVT shares a confirmation message which is finally verified by RSUs.
An ECC-based certificateless aggregate signature authentication mechanism was presented by Thumbur et al. in [231]. Combining several unique signatures on distinct messages from different vehicles into a single signature, it decreases verification time and storage requirement at RSU. It assumes the elliptic curve discrete logarithm problem is not forgeable. The vehicle generates public-private key pair upon receiving a partial secret key.
Zhang et al. also developed an ECC-based protection protocol in [232]. It calculates its private key by summing a stored key in the TPM module and a random number to avoid a side-channel attack. RSU broadcasts the certificate every five seconds, and the vehicle verifies that and shares the signature. RSU verifies the signature for mutual authentication. TA uses two hash functions to revoke the authenticity of RSUs and vehicles. However, as each vehicle generates its own pseudo-identity, the system will not authenticate the vehicle if the PID is in the compromised list. Also, this scheme needs secured communication between RSU and TA. Here, TA works as a cloud as well.
Ghahramani et al. [233] proposed an ECC-based framework to enhance the system proposed by Li et al. in [234] for mobility networks. Mobile users (MU) are connected to a home agent (HA), and when MU goes beyond the coverage area of HA, it will be connected to a foreign agent (FA). The storage cost of the framework is high as MU, HA, and FA need to store many parameters. Moreover, each FA needs to register with each HAs and also needs to have information about MUs. FAs will complete the authentication with HAs when MU makes a request. Compared to other frameworks, this requires many more calculations.
In [235], Xie et al. solved the flaws of the framework of Banerjee et al. [236]. This work covers the communication between the sensor and the user via a gateway, but the communication to the server is absent here. Verification of user in sensor should be done in step two instead of step four to avoid unnecessary computation and communication in case of invalid user. The protocol could suffer from a smart card stolen attack.
Xia et al.’s [237] proposed a framework to work on edge data of smart grids. To secure against reply attacks, random nonces were encrypted in each stage. The smart meter used the private key to prove its identity. It is required to consider security at the hardware level.
Another authentication framework was designed by Chen et al. in [238]. The method covers the communication between edge devices and the smart meters. The secure communication to the control center is not presented. It is unclear how the smart meter will select edge nodes based on hashed pseudo-ID. Edge nodes could be compromised if an attacker could extract the pseudo-IDs of the edge nodes. The authentication is completed in two message flow. Srinivas et al. in [239] showed an authentication mechanism using ECC for the vehicular network. The method needs to be optimized as it requires high computational cost and communication overhead due to complex calculations.
Velliangiri et al. [240] proposed an ECC-based authentication method for Industry 4.0. The method has four steps which are initialization phase, certificate registration, certificate publication phase, and data encryption phase. The article did not provide proper utilization of every parameter used in the initialization phase, and the paper needs to show elaborate processes. Moreover, the computational cost is around 8 s, which needs to be optimized.
Ryu et al. [241] also proposed an ECC-based authentication framework for the medical system. The scheme used ID, password, biometrics, and a random number as features to generate different parameters to store for the authentication phase. If an attacker gets stored parameters, s/he will not be able to complete authentication due to the absence of features. But the framework can optimize storage cost, and computation cost as two parameters do not take part in the authentication. Moreover, the computation and communication cost is high compared to other frameworks.
For smart parking, Khaliq et al. [201] proposed an authentication method using ECC and location differential privacy based on Laplace distribution. The method needs to use third-party app and also hide the sensitive data in local settings before sharing with service provider. The method needs to change pseudo-identity after each verification which is not presented in the paper.
In [242], Ali et al. proposed a method for V2I communication. In the method, vehicle used identity based cryptography to signcrypt plaintext, and RSU used PKI to de-signcrypt the messages to get the plaintext.

6.6. ML-Based

It is a supervised machine learning-based data-centric misbehavior detection model development that was proposed by Sharma et al. in [243]. Scikit-learn was performed to complete the experiment. This work includes six algorithms to identify position-based attacks. Using supervised ML, four quantitative features are extracted to check location plausibility and movement plausibility to find out patterns and predict the misbehavior of vehicles.
Pascale et al. used in [244] an embedded intrusion detection system in an SoC in the vehicle. This work checks whether present data or received data is malicious by initially filtering all the messages on the controller area network (CAN-Bus). Then it passes two steps algorithm to detect attacks. In the pre-processing step, it analyzes ten state frames containing several parameters, such as RPM, brake, speedometer, etc., recorded with timestamps in each 4 ms through spatial and temporal analysis. The Bayesian network, uses Bayes’ theorem where a probabilistic graph that predicts the dependency relationship using a set of random variables through a probabilistic inference process, is applied in the second step. It identifies attacks by comparing previously trained through a pre-established data set and parameters obtained as information from these parameters.

6.7. CHAP PPP-Based

Challenge-Handshake Authentication Protocol Point-to-Point (CHAP PPP) based authentication protocol proposed by Pradeep et al. in [245] for the smart city. CHAP guards against replay attacks by changing the challenge. The secret parameters must be in plain text to both client and server to complete authentication. It is a three-way handshake where challenges are sent using hash and the other side compares with the predicted value. One challenge is that the same challenge cannot be used at the same time by other clients. If the password or the secret key is revealed, the client will be compromised. It is highly unacceptable to physical or side-channel attack.

6.8. PUF-Based

Wang et al. in [246] designed a novel on board unit (OBU) with three-level security layers. The architecture of OBU is divided into four areas which are (1) Area A: Core security area which is assumed to be secured, (2) Area B: Signal transmitting area which takes input from other areas, (3) Area C: External hardware devices access area which communicates with authenticated devices, and (4) Area D: External network access area where network interface cards and PUF are embedded. The authentication scheme works in three stages which are (1) Periodically updated session keys to authenticate external networks and devices, (2) PUF for authenticating multiprocessor and information from internal area B, and (3) Hardware isolation using FPGA logic gates.
Alladi et al. developed a scheme using both ECC and PUF [247]. TA is responsible for registering each vehicle in the network. In the registration phase, a secret key is generated using ECC output and the Vehicle ID. Unlike other PUF-based technology, it uses one CRP for each vehicle. Each vehicle is registered to the cloud server. For authentication, the vehicle raises a request to RSU, and RSU validates vehicle ID using CRP with the help of the edge server and also checks timestamp difference. The secret, along with nonce and other parameters, are exchanged between the vehicle and RSU for completing authentication. It is required to have a secured channel between RSU and the edge server.
Aman et al.’s work considered an RSU gateway to serve several RSUs, and once the vehicle is authenticated with an RSU of an RSU gateway, the vehicle does not need to be authenticated with other RSUs of that RSU gateway [248]. A vehicle sends its crypto-identity, constructed using a secure hash of ID, secret PUF response, and a random nonce, to RSU for authentication purposes. Every RSU has a stored challenge like Alladi et al. to generate a response, and the RSU encrypts received messages from vehicles using generated response and sends it to the RSU gateway. RSU gateway verifies the response and extracts messages and shares with TA using a secret key. TA generates a token that contains the session key along with CRP so that vehicle can extract the session key using CRP. This session key is being used to communicate with other RSUs of the same RSU gateway. It is required to update the CRP of each vehicle with TA periodically.
Alladi et al. also proposed a PUF-based authentication scheme in [249]. During registration, it stores a CRP in the server and the challenge to the device memory. For authentication, the device generates a response to the stored challenge and the server compares it with the stored response. Server verification is done by diving the response and computing with a nonce. If the device gets the same response it will then generate a new CRP and will share that with the server and the server will replace the previously stored CRP. A new temporary ID and session key will be generated. It could reveal the vehicle ID as it sends the ID in a message. There could be a server impersonation attack if an adversary asks for a response from the vehicle.
In [250], Yanambaka et al. presented a PUF based security solution for IoMT. A PUF based on a hybrid ring oscillator was created for the authentication mechanism in this study. CRP was saved on the server, and the IoMT device was authenticated depending on the device’s answer to the server’s challenge. It can withstand client impersonation attacks, but it cannot withstand machine learning or server impersonation attacks.
For secure communication in a smart grid, Badar et al. [251] proposed an authentication scheme using PUF. PUF is generally used to avoid storage in device memory, but the framework needs to store in edge nodes. CRPs are used for control center verification in the last stage. The protocol is not free from physical attack, and the communication cost is high.
Tanveer et al. [252] used ECC and PUF to make reliable smart grid communication. The PUF was used to decrypt the secret keys in the smart meter. As the secret key is stored using encryption, the attacker can get the data using physical access and tries to decrypt it. If the attacker is able to decrypt, it will be able to impersonate the smart meter. Moreover, the framework has some unnecessary storage and computation. If the PUF is reliable, it will be able to produce an exact decryption key to get the secret key, so it is not relevant to verify the combination of key and response.
Lee et al. in [253], proposed a PUF-based dynamic group authentication key agreement framework for IoMT. The framework has medical device addition, rejection, fault identification, and tolerance functionality. Though it uses PUF to avoid storage, it needs to store a parameter that will be required for computation in the authentication and group key agreement phase. Authentication and key agreement between two devices are started through the register center by sending a seed. After that, two devices authenticated each other by generating PUF response, stored parameter, hash, and XOR operations. After mutual authentication, both devices broadcast a secret key, which helps other to update the group key. If the mutual authentication between two newly added devices before communicating with existing devices, then the group will not be able to update the group key. Also, how the new device will get the existing group key needs to be clarified.

6.9. Blockchain-Based

Jiang et al. showed the application and performance of blockchain in the case of IoV in [254]. It presents how data flow and re-transmission are related to network traffic growth. Security details will be considered in their future work.
To make faster transaction confirmation and speed up new users, this work established a novel debit-credit mechanism for blockchain-based (PoW) data trading by Liu et al in [255]. A vehicle can loan from multi vehicles as per demand by promising to pay interest and reward. It uses a two-stage Stackelberg game to maximize the profits of borrower vehicles and lender vehicles jointly. Nash equilibrium is reached when there are optimal pricing strategies. To make the account secure, it uses encrypted signatures using corresponding keys and certificates. It is assumed that an adversary cannot forge a signature of a vehicle or gain control over the majority of system resources.
A blockchain-based incentive mechanism has been proposed by Yin et al. in [256], where multiple vehicles can participate in bidding to allow their resources to complete a task through a smart contract for secure transactions. The method identifies malicious bidding by unusual price and quality of data provided. If any vehicle is identified as a malicious vehicle, then it will be removed from the network and it will not get any reward. For accomplishing any emergency task, the bidding process will be omitted, and multiple vehicles can make a cluster as per the same time allocation and resources. A novel time-window-based method is developed to manage the emergency task. Here, as malicious nodes are identified after receiving a report, a malicious incident can happen. Also, in case of an emergency task, it ignores the bidding, and the communication of inter-vehicle for clustering is not depicted which can compromise clustered vehicles and networks as well.
Yang et al. proposed a decentralized trust management system based on blockchain [257]. It employed a joint PoW and PoS consensus mechanism. Vehicles validate received messages from surrounding cars and calculate credibility using the Bayesian Inference Model. Vehicles consider the distance between sender and event location. Based on the result, vehicles upload ratings to neighboring RSUs and it then calculates trust offset to finalize data. RSUs work as a miner. It assumes that RSUs will not be compromised due to the limited resources of an attacker.
Gao et al. combined 5G network for low latency, a software-defined network (SDN) for effective network management, fog computing for avoiding frequent handovers, and an incorporated trust model to make the decision about message authenticity in [258]. The vehicles are equipped with SDN-enabled OBU. The practical Byzantine fault-tolerance consensus algorithm is used for verifying correctness. RSU hubs are used as miners, and PoW puzzle solutions are used in this blockchain method. In this method, peers provide verdicts about the trustworthiness of the information, such as time of event reporting, location of the event, etc. provided by the neighbor vehicle. The trust model is organized into three algorithms, (1) Cluster model: neighbor vehicles make a cluster, (2) Message forward model: Verdicts are collected and aggregated and forwarded the message to the other clusters in the network to create awareness. (3) Judgment model, which concerns the decision obtained over a sender’s message after several verdicts. However, a Cluster should be random as vehicles are moving and no pattern follows.
Xu et al. proposed an energy-efficient transaction model using blockchain in [259]. This work mainly focused on fewer transactions to reduce network traffic. It used asymmetric encryption to incorporate security. Instead of sending direct data, it will send functions using an adaptive linear prediction algorithm where a certain amount of real data will be trained. If the new data is not within the preset value, it will forward the function. By sensing energy consumption/rewarded coin system, the system will sense whether devices are compromised or not. Data accuracy depends on the amount of data. If there is a high amount of data, the error rate will be lower.
A blockchain-based scheme was proposed using smart contracts for securing the framework for registering trusted vehicles and blocking malicious ones. The scheme used certificates for communicating and reserving privacy with vehicles and RSUs, PUF for establishing trust, dynamic PoW consensus algorithm for scaling incoming traffic by Javaid et al. in [260]. RSUs act as miners. In the registration phase, CRPs are stored, and a certificate is issued. If the vehicle is in the local blockchain, then the certificate will work for authentication. In the authentication phase, vehicles and servers share CRP for trust establishment. After that MAC is used with the stored parameter in memory for ensuring data integrity. After verifying MAC, it uses the private key to the hash, and then a certificate will be used instead of the CRP of PUF later. It is considered that RSU will not be compromised. As RSUs store certificate and it is prone to attack, the system could be compromised. It can reveal few responses to an adversary as it is sharing a response after getting a challenge. It is also using private and public keys hashing.
A blockchain and ECC-based authentication framework for the smart city was proposed by Vivekanandan et al. in [261]. Mutual authentication between two devices happens by sharing the stored secret key in the devices. The method excludes the usage of gateway nodes to reduce computational cost and also uses private blockchain for registration purposes which can only be accessed by authorized personnel. It used the location as a feature for authentication purposes. The method did not use central authority during authentication except at registration time, but the method does not require any information from the central authority. So, the registration information of the central authority is irrelevant. Moreover, it says that ID is a permanent secret, but it uses the ID of other devices during authentication. An attacker can eavesdrop on the message flow and can get the secrets to impersonate in the future. Furthermore, the authors did not describe the authentication framework which is required for the readers to get a full view.
In [262], Wang et al. pointed to the rise of heterogeneous data (for example, for ehealthcare systems) that is being used to transfer large amounts of patient records to centralized cloud servers for illness diagnosis. It is, however, vulnerable to a number of security problems that can be mitigated by authentication. In the paper, the authors suggested an authentication scheme that uses blockchain technology and PUF. In addition, a fuzzy extractor approach is used to deal with biometric data. Their investigation revealed that their work has the smallest computing and communication costs of all the systems considered.
Son et al. [263] proposed blockchain-based authentication framework considering handover for V2I communication. In the method, ECC is used to perform the initial authentication. To avoid complex computation at the time of handover, the method used only hash and XOR operations. RSU is responsible for authentication, and it used signature to validate the transaction. Some clarity is required regarding few parameters as those are not showed as stored or calculated. Moreover, the method could be affected by smart contact capture and dictionary attack if a verification can be avoided in the vehicle to initiate authentication.
Yang et al. in [264] proposed multidomain authentication using blockchain to build distributed trust. There are three layers: the first layer is the perception layer where vehicles, RSU, etc. will be present, the management layer is the second layer where certificate authority and third-party authorities will form a consortium; and, the third layer is the blockchain layer which stores credentials, records, cross-domain information, etc. It introduced a key derivation algorithm to generate batch pseudonym distribution to resilient key escrow. In the future, the authors will incorporate V2V secure confidential data sharing.
Cheng et al. [265] incorporated blockchain, certificateless cryptography [266], ECC, and pseudonym-based cryptography (PBC) [267] to have a secure authentication between edge servers and IoT devices. As identity-based encryption (IBE) is vulnerable to key abuse issues, certificateless cryptography is introduced, which will generate a public key using the identity of the device and a secret value only known to the device. PBC is based on IBE to hide the identity. The method has static mutual authentication for static devices, intraedge mutual authentication for moving devices from one server to another server, and interedge mutual authentication for mobile IoT devices. After authentication, both the IoT device and the edge server will decide the new session key for encrypting shared data.
Xu et al. in [268] proposed a blockchain-based group key agreement protocol where a device needs to authenticate a device that is in the left position of it. A key distributor center (KDC) will store the credentials and parameters of the serving group. After collecting parameters from the blockchain, the right side device will authenticate the left neighbor. After authentication, using group authentication, the group key will be negotiated. The framework could be affected by device capture attacks, and a malicious user can add more devices as only the right side device can authenticate the new device, and the authentication will only be performed for a single time. Also, the process of changing the location of serving KDC is not mentioned.
In [269], Xu et al. proposed an authentication framework using blockchain and token mechanism. After authentication, a device will get a token that will be valid for a certain timezone. A device will get a token from a private key generator (PKG) which forms the blockchain. All the PKG will form a mesh to support in case of any failure. After the completion of authentication, the group will decide the group key. In the future, the authors will include more security features and will reduce energy consumption with less complexity.
Table 10 shows a comparative analysis of IoT security solutions.

7. Challenges and Future Directions

Although there have been some difficulties incorporating IoT and Wireless sensors into Industry 4.0, smart systems can address a variety of issues encountered by the industrial sector. IoT and Wireless sensor technological advancements have raised more questions regarding security, privacy, and data management. Manufacturers and businesses struggle to effectively manage the growing amount of data being produced. AI algorithms are being used to handle Big Data and improve the intelligence of systems and gadgets. The data is processed using the algorithms throughout a variety of time frames.

7.1. Lightweight Cryptographic Algorithms

Data leakage can be greatly increased by the billions of connections that exist between equipment, people, and information-sharing network. IoT systems are so prevalent and pervasive that there will inevitably be issues with network privacy and data security. Data safeguard, and information security must be ensured in a variety of activities, such as transportation services, personal affairs, operations, and information protection. Encryption is one of the approaches to do so. Failure to use encryption could result in data being intercepted, changed, or even permanently deleted. As a result, encryption methods—more specifically, dynamic encryption need to be used to protect the data and guarantee its confidentiality. Different attacks, such as insider attacks can not be resisted using encryption, and it can cause massive issues to the IoT network. Symmetric key based cryptographic methods might not be suitable for low memory devices. Similar level of security can be provided by ECC with lower size of the key. To avoid storage, PUF can be incorporated as a cryptographic method. PUF can produce unique keys. However, PUF can be impacted by external factors, such as voltage, pressure, humidity, noise, and many other factors. Reliability is a major issue for PUF for being deployed. Moreover, developing a strong PUF by maintaining all the required characteristics is difficult. Furthermore, different research showed that PUFs are susceptible to modeling attacks. XOR PUF shows better resistance compared to arbiter PUF, and a few others. ML is also used as a security primitive. ML is mainly used for intrusion detection rather than as a cryptographic algorithm. The cryptographic measures will raise transmission overhead that can be considered as a burden for IoT applications such as IoMT. Latency reduction and resource utilization are major concerns for IoT applications as real-time data communication is required for monitoring and decision-making in different IoT applications. Moreover, processing huge amount of data requires battery power. If the power consumed cryptographic algorithms are applied that could end the battery life and impact on life-cycle of the devices.

7.2. Lightweight Authentication Frameworks

One of the major elements of IoT is security and privacy. It is becoming a major challenge to ensure the privacy of user data. If an attacker can enter the system, s/he can find out the way of doing DoS or MITM attacks by getting a clear idea of the communication framework. The level of vulnerabilities will be increased further if the system is in an open environment rather than a close environment. This article gave a brief overview of existing authentication frameworks for different IoT applications. RSA based authentication scheme needs more key size length compared to ECC based mechanism. Feasibility checking of ABE and ECG based methods need to be carefully designed for the IoMT network. Attributes will be changed from time to time and it will affect the authentication. Like ABE, ECG parameters may fluctuate based on the health condition. By physically accessing the device, an attacker can get the encryption key which can be used to get data of future communications. On the other hand, direct uses of the PUF key can be subjected to modeling attack. Many PUF based authentication methods require storing challenge which is contradictory to PUF benefits (removal of storage). Moreover, PUF based methods also require a separate module or logic gates to be embedded in the device which may raise complexity or increment the size of the device. There might will some impact on prices as well. Furthermore, to avoid server impersonation attack, researchers used PUF in cloud server as well. As server can receive multiple requests at a time, how the server will process the request using PUF is not clarified. Also, PUF increases the database size of the cloud server and for a large network, server needs to have additional resources to make query to the database. Different frameworks use many authentication steps and complex calculations to complete the authentication process, which increases computation cost and communication overhead. Authentication protocol needs to be designed with fewer numbers and sizes of messages with simple calculations. Instead of using static structure, dynamic structure can provide same level of security with less data exchange. FL can be a good option for authentication, which uses a local model to the update global model by cooperative training and getting data. Also, the power of AI can bring an advantage to complete the authentication process. Most of the researchers focused on vehicle to server secure communication. It is required to put focus on the vehicle to others’ communication to make a secure and complete IoV environment. Mobility is also required to be considered for IoV or other applications as vehicles/devices might move outside of the current serving region. While considering authentication framework, cloud security needs to be ensured for centralized methods, which is a major research area. Cloud could be public or private. Cloud storage is vulnerable to data manipulation and illegal resources, which could interfere with the process of smart networks. Decentralized authentication can be applied for both homogeneous and heterogeneous networks. Elements of blockchain network such as smart contract need to be robust enough to maintain security. With the introduction of 6G, more devices with large data will be involved in the network. To ensure the authenticity and reliability of information, data anonymity needs to be addressed in the form of cipher, hash, random nonces, masking, PUF, etc.

7.3. Data Processing

A large amount of connected IoT devices generates enormous data called Big Data. The sensors and actuators on millions of consumer devices are interconnected, interacting, gathering, and transmitting the information. Each device produces or senses a large amount of data that requires further processing. The main problem will be making sure that these different forms of data are handled appropriately and efficiently, especially given the lack of time, computational resources, and processing power. In 2000, the volume of stored data was 80,000 petabytes, whereas it was predicted that by 2020 the volume would be 35 zettabytes. However, only 20% of these are analyzed by traditional methods due to different data structures, and the rest 80% is not taking part in the decision-making purposes. It is assumed that the quantity of data will be increased further with the evaluation of 6G. Data-driven methods can be developed with the help of FL and AI to handle Big Data from large-scale IoT devices.

7.4. Scalability

There are a remarkable amount of devices that make up the IoT. Instead of being networked as a loop, such devices are typically connected to each other in hierarchy subdomains. As a result, there are substantially more connected devices than there are on the present internet. Scalability is hampered by the architecture’s complexities. In order to address complex networks and maintain extremely simple techniques in the network, this problem should be solved. A system that supports and scales with a wide range of sensors recognizes and addresses this. Moreover, authentication frameworks should be designed in such a way that they can be deployed in a system with a large number of resource-constrained devices.

7.5. Interoperability

A variety of sensors featuring various sensing methods or communication spans are found in a heterogeneous network. Researchers should undertake the required analysis compared to isomorphic situations because it is feasible that heterogeneity influences the problem formulation. In a network, there will be devices from multiple vendors, which need to ensure communication among those devices. Moreover, a system needs to establish connectivity with another network of different functions which can not be ensured without interoperability. Security and privacy are the major concerns while data traverse from one network to another. The data structure should be uniform to process the data and make decision.

7.6. Governance

IoT is being accepted in every arena, which demands governance to set goals of organizations, product quality, features, security measurements, actions to mitigate risks, decision making, pre-market and post-market analysis, continuous monitoring, etc. The European Union has provided guidelines regarding the flow of user data. The common guideline should be listed which manufacturers will follow from the initial stage of product design so that each device can be free from security threats. Moreover, legal organizations from each country or region should develop regulations to protect consumer rights. Legal bodies from different countries will set up laws on how the device and manufacturers will support customers through applications such as monitoring, proving reports, etc.

7.7. Education and Training

To avoid attacks due to phishing, social engineering, etc., it is required to allocate a budget from manufacturers or producers to raise awareness among clients and consumers so that they identify the sign of potential attacks due to phishing or reverse engineering. Many users are not quite aware of technological things, so without proper awareness, they could be an entry point for attackers to enter the system. Moreover, technical people need to go through specialized training to maintain the safety of the system and users’ confidential information. A company should develop a friendly user interface where engineers can automatically configure, update, and maintain the network.

8. Conclusions

With the emergence and rapid growth of IoT applications, it is drawing continuous attention of attackers and the research community to identify vulnerabilities in security ranging from device attacks to data transport attacks. Moreover, IoE is evolved with the extensive application of IoT in the industry. Furthermore, via the application of intelligent technological innovation, the physical world is being merged with the virtual world, exacerbating the vulnerabilities of IoT-based industrial systems. In this survey, not only are the details of taxonomy of IoT based security and privacy issues discussed, but also countermeasures of each kind of security threat are provided. Different centralized and decentralized security solutions are also discussed. Furthermore, this paper highlighted the IoT ecosystem, applications, functions, and challenges. In the next part, it covered all kinds of security aspects, such as—ABE, ECC, MAC, ML, PUF, and Blockchain for IoT applications based on existing security schemes. In the future, how the aggregation of the quantum system, 5G, FL, AI, and existing centralized and decentralized systems can achieve better data processing, keep data integrity and provide security in the device and data transmission will be explored. Whether Named Data Network (NDN) can achieve better security compared to IP based systems will be discussed. Moreover, different security regulations, ongoing research in the industry, and newly developed attacking methods will also be presented.

Author Contributions

Formal analysis, P.K.S., V.P.Y. and A.A.; Funding acquisition, A.A.; Methodology, P.K.S. and V.P.Y.; Project administration, V.P.Y. and A.A.; Software, P.K.S.; Supervision, V.P.Y. and A.A.; Validation, P.K.S., V.P.Y. and A.A.; Visualization, P.K.S. and V.P.Y.; Writing—original draft, P.K.S. and V.P.Y.; Writing—review & editing, P.K.S., V.P.Y. and A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tran-Dang, H.; Krommenacker, N.; Charpentier, P.; Kim, D.S. Toward the Internet of Things for Physical Internet: Perspectives and Challenges. IEEE Internet Things J. 2020, 7, 4711–4736. [Google Scholar] [CrossRef]
  2. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  3. Vasseur, J.; Dunkels, A. Chapter 4-IPv6 for Smart Object Networks and the Internet of Things. In Interconnecting Smart Objects with IP; Elsevier: Amsterdam, The Netherlands, 2010; pp. 39–49. [Google Scholar]
  4. Song, Z.; Cárdenas, A.A.; Masuoka, R. Semantic Middleware for the Internet of Things. In Proceedings of the Internet of Things (IOT), Tokyo, Japan, 29 November–1 December 2010; pp. 1–8. [Google Scholar]
  5. Čolaković, A.; Hadžialić, M. Internet of Things (IoT): A Review of Enabling Technologies, Challenges, and Open Research Issues. Comput. Netw. 2018, 144, 17–39. [Google Scholar] [CrossRef]
  6. Zemrane, H.; Baddi, Y.; Hasbi, A. Comparison between IOT Protocols: ZigBee and WiFi using the OPNET Simulator. In Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications, Rabat, Morocco, 24–25 October 2018; pp. 1–6. [Google Scholar]
  7. Ray, P.P.; Agarwal, S. Bluetooth 5 and Internet of Things: Potential and architecture. In Proceedings of the International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India, 3–5 October 2016; pp. 1461–1465. [Google Scholar]
  8. Wang, Y.; Chen, C.; Jiang, Q. Security Algorithm of Internet of Things based on ZigBee Protocol. Clust. Comput. 2019, 22, 14759–14766. [Google Scholar] [CrossRef]
  9. Al Enany, M.O.; Harb, H.M.; Attiya, G. A Comparative Analysis of MQTT and IoT Application Protocols. In Proceedings of the International Conference on Electronic Engineering (ICEEM), Menouf, Egypt, 3–4 July 2021; pp. 1–6. [Google Scholar]
  10. Haxhibeqiri, J.; De Poorter, E.; Moerman, I.; Hoebeke, J. A survey of LoRaWAN for IoT: From Technology to Application. Sensors 2018, 18, 3995. [Google Scholar] [CrossRef] [PubMed]
  11. Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
  12. Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A.V. Software-Defined Industrial Internet of Things in the Context of Industry 4.0. IEEE Sens. J. 2016, 16, 7373–7380. [Google Scholar] [CrossRef]
  13. Mahmud, M.I.; Abdelgawad, A.; Yanambaka, V.P.; Yelamarthi, K. Packet Drop and RSSI Evaluation for LoRa: An Indoor Application Perspective. In Proceedings of the 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 14–31 July 2021; pp. 913–914. [Google Scholar]
  14. Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E.; Puthal, D. PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consum. Electron. Mag. 2020, 9, 8–16. [Google Scholar] [CrossRef]
  15. Raj, A.; Prakash, S. Internet of Everything: A survey based on Architecture, Issues and Challenges. In Proceedings of the 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gorakhpur, India, 2–4 November 2018; pp. 1–6. [Google Scholar]
  16. Miraz, M.H.; Ali, M.; Excell, P.S.; Picking, R. A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT). In Proceedings of the Internet Technologies and Applications (ITA), Wrexham, UK, 8–11 September 2015; pp. 219–224. [Google Scholar]
  17. Farias da Costa, V.C.; Oliveira, L.; de Souza, J. Internet of Everything (IoE) Taxonomies: A Survey and a Novel Knowledge-Based Taxonomy. Sensors 2021, 21, 568. [Google Scholar] [CrossRef]
  18. Padhi, P.K.; Charrua-Santos, F. 6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework. Appl. Syst. Innov. 2021, 4, 11. [Google Scholar] [CrossRef]
  19. Garzia, F.; Papi, L. An Internet of Everything based Integrated Security System for Smart Archaeological Areas. In Proceedings of the IEEE International Carnahan Conference on Security Technology (ICCST), Orlando, FL, USA, 24–27 October 2016; pp. 1–8. [Google Scholar]
  20. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  21. Capkun, S.; Buttyan, L.; Hubaux, J.P. Self-organized Public-key Management for Mobile Ad hoc Networks. IEEE Trans. Mob. Comput. 2003, 2, 52–64. [Google Scholar] [CrossRef]
  22. Delavar, M.; Mirzakuchaki, S.; Ameri, M.H.; Mohajeri, J. PUF-based Solutions for Secure Communications in Advanced Metering Infrastructure (AMI). Int. J. Commun. Syst. 2017, 30, e3195. [Google Scholar] [CrossRef]
  23. Shamsoshoara, A.; Korenda, A.; Afghah, F.; Zeadally, S. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Netw. 2020, 183, 107593. [Google Scholar] [CrossRef]
  24. Liu, Y.; Dai, H.N.; Wang, Q.; Shukla, M.K.; Imran, M. Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges. Comput. Commun. 2020, 155, 66–83. [Google Scholar] [CrossRef]
  25. DeNardis, L. The Internet in Everything: Freedom and Security in a World with No Off Switch; Yale University Press: New Haven, CT, USA, 2020. [Google Scholar]
  26. Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
  27. Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
  28. Sharma, V.; You, I.; Andersson, K.; Palmieri, F.; Rehmani, M.H.; Lim, J. Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. IEEE Access 2020, 8, 167123–167163. [Google Scholar] [CrossRef]
  29. Barua, A.; Al Alamin, M.A.; Hossain, M.S.; Hossain, E. Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey. IEEE Open J. Commun. Soc. 2022, 3, 251–281. [Google Scholar] [CrossRef]
  30. Hameed, S.; Khan, F.I.; Hameed, B. Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. J. Comput. Netw. Commun. 2019, 2019, 9629381. [Google Scholar] [CrossRef] [Green Version]
  31. Fernández-Caramés, T.M. From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things. IEEE Internet Things J. 2020, 7, 6457–6480. [Google Scholar] [CrossRef]
  32. Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
  33. Chettri, L.; Bera, R. A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems. IEEE Internet Things J. 2020, 7, 16–32. [Google Scholar] [CrossRef]
  34. Khan, M.N.; Rao, A.; Camtepe, S. Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. IEEE Internet Things J. 2021, 8, 4132–4156. [Google Scholar] [CrossRef]
  35. Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
  36. Song, Y.; Yu, F.R.; Zhou, L.; Yang, X.; He, Z. Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive Survey. IEEE Internet Things J. 2021, 8, 4250–4274. [Google Scholar] [CrossRef]
  37. Rafique, W.; Qi, L.; Yaqoob, I.; Imran, M.; Rasool, R.U.; Dou, W. Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1761–1804. [Google Scholar] [CrossRef]
  38. Friha, O.; Ferrag, M.A.; Shu, L.; Maglaras, L.; Wang, X. Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies. IEEE/CAA J. Autom. Sin. 2021, 8, 718–752. [Google Scholar] [CrossRef]
  39. Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things. IEEE Internet Things J. 2021, 8, 4004–4022. [Google Scholar] [CrossRef]
  40. Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on Blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
  41. Sadawi, A.A.; Hassan, M.S.; Ndiaye, M. A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate Challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
  42. Khor, J.H.; Sidorov, M.; Woon, P.Y. Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art Survey. IEEE Internet Things J. 2021, 8, 11960–11982. [Google Scholar] [CrossRef]
  43. Arora, P.; Kaur, B.; Teixeira, M.A. Machine Learning-Based Security Solutions for Healthcare: An Overview. In Emerging Technologies for Computing, Communication and Smart Cities; Springer: Singapore, 2022; pp. 649–659. [Google Scholar]
  44. Gaurav, A.; Gupta, B.B.; Panigrahi, P.K. A Comprehensive Survey on Machine Learning Approaches for Malware Detection in IoT-based Enterprise Information System. Enterp. Inf. Syst. 2022, 1–25. [Google Scholar] [CrossRef]
  45. Gaur, A.; Scotney, B.; Parr, G.; McClean, S. Smart City Architecture and its Applications Based on IoT. Procedia Comput. Sci. 2015, 52, 1089–1094. [Google Scholar] [CrossRef]
  46. Du, R.; Santi, P.; Xiao, M.; Vasilakos, A.V.; Fischione, C. The Sensable City: A Survey on the Deployment and Management for Smart City Monitoring. IEEE Commun. Surv. Tutor. 2018, 21, 1533–1560. [Google Scholar] [CrossRef]
  47. Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. Sensors 2022, 22, 5517. [Google Scholar] [CrossRef]
  48. Sadhu, P.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things. IEEE Consum. Electron. Mag. 2022. early access. [Google Scholar] [CrossRef]
  49. Wei, K.; Zhang, L.; Guo, Y.; Jiang, X. Health Monitoring Based on Internet of Medical Things: Architecture, Enabling Technologies, and Applications. IEEE Access 2020, 8, 27468–27478. [Google Scholar] [CrossRef]
  50. Ghubaish, A.; Salman, T.; Zolanvari, M.; Unal, D.; Al-Ali, A.; Jain, R. Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security. IEEE Internet Things J. 2020, 8, 8707–8718. [Google Scholar] [CrossRef]
  51. Healthcare Data Breaches Hit All-Time High in 2021. Available online: https://www.fiercehealthcare.com/health-tech/healthcare-data-breaches-hit-all-time-high-2021-impacting-45m-people (accessed on 4 April 2022).
  52. Burr, M.T. Reliability Demands will Drive Automation Investments. Fortnightly Magazine, 1 November 2003; 1–4. [Google Scholar]
  53. Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659. [Google Scholar] [CrossRef]
  54. Shakarian, P. Stuxnet: Cyberwar Revolution in Military Affairs; Technical Report; Military Academy: West Point, NY, USA, 2011. [Google Scholar]
  55. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
  56. Sadhu, P.K.; Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles. arXiv 2022, arXiv:2204.07709. [Google Scholar]
  57. Bagga, P.; Das, A.K.; Wazid, M.; Rodrigues, J.J.; Park, Y. Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges. IEEE Access 2020, 8, 54314–54344. [Google Scholar] [CrossRef]
  58. Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the IEEE World Congress on Services, Washington, DC, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
  59. Díaz López, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Moron Castro, S.; Nespoli, P.; Gómez Mármol, F. Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [Google Scholar] [CrossRef]
  60. Smart Yet Flawed: IoT Device Vulnerabilities Explained. Available online: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/smart-yet-flawed-iot-device-vulnerabilities-explained (accessed on 6 June 2021).
  61. Koley, S.; Ghosal, P. Addressing Hardware Security Challenges in Internet of Things: Recent Trends and Possible Solutions. In Proceedings of the IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, 10–14 August 2015; pp. 517–520. [Google Scholar]
  62. Venugopalan, V.; Patterson, C.D. Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things. J. Hardw. Syst. Secur. 2018, 2, 131–141. [Google Scholar] [CrossRef]
  63. Abdul-Ghani, H.A.; Konstantas, D. A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. J. Sens. Actuator Netw. 2019, 8, 22. [Google Scholar] [CrossRef]
  64. Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security. IEEE Internet Things J. 2020, 7, 10250–10276. [Google Scholar] [CrossRef]
  65. Zhang, P.; Nagarajan, S.G.; Nevat, I. Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things. IEEE Internet Things J. 2017, 4, 2199–2206. [Google Scholar] [CrossRef]
  66. Stan, O.; Bitton, R.; Ezrets, M.; Dadon, M.; Inokuchi, M.; Yoshinobu, O.; Tomohiko, Y.; Elovici, Y.; Shabtai, A. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1936–1954. [Google Scholar] [CrossRef]
  67. Spoofing Attack: IP, DNS & ARP. Available online: https://www.veracode.com/security/spoofing-attack (accessed on 6 June 2021).
  68. Zhang, C.; Hu, G.; Chen, G.; Sangaiah, A.K.; Zhang, P.; Yan, X.; Jiang, W. Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack. IEEE Access 2018, 6, 22764–22777. [Google Scholar] [CrossRef]
  69. Raguvaran, S. Spoofing Attack: Preventing in Wireless Networks. In Proceedings of the International Conference on Communication and Signal Processing, New York, NY, USA, 3–5 April 2014; pp. 117–121. [Google Scholar] [CrossRef]
  70. Hussain, M.A.; Jin, H.; Hussien, Z.A.; Abduljabbar, Z.A.; Abbdal, S.H.; Ibrahim, A. DNS Protection against Spoofing and Poisoning Attacks. In Proceedings of the 3rd International Conference on Information Science and Control Engineering (ICISCE), Beijing, China, 8–10 July 2016; pp. 1308–1312. [Google Scholar] [CrossRef]
  71. Maksutov, A.A.; Cherepanov, I.A.; Alekseev, M.S. Detection and Prevention of DNS Spoofing Attacks. In Proceedings of the Siberian Symposium on Data Science and Engineering (SSDSE), Novosibirsk, Russia, 12–13 April 2017; pp. 84–87. [Google Scholar] [CrossRef]
  72. Belapurkar, A.; Chakrabarti, A.; Ponnapalli, H.; Varadarajan, N.; Padmanabhuni, S.; Sundarrajan, S. Distributed Systems Security: Issues, Processes and Solutions; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
  73. Alam, S.; De, D. Analysis of Security Threats in Wireless Sensor Network. arXiv 2014, arXiv:1406.0298. [Google Scholar] [CrossRef]
  74. Mayzaud, A.; Badonnel, R.; Chrisment, I. A Taxonomy of Attacks in RPL-based Internet of Things. Int. J. Netw. Secur. 2016, 18, 459–473. [Google Scholar]
  75. Sikder, A.K.; Petracca, G.; Aksu, H.; Jaeger, T.; Uluagac, A.S. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. arXiv 2018, arXiv:1802.02041. [Google Scholar]
  76. Matyunin, N.; Szefer, J.; Biedermann, S.; Katzenbeisser, S. Covert Channels using Mobile Device’s Magnetic Field Sensors. In Proceedings of the 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016; pp. 525–532. [Google Scholar]
  77. Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of Security Attacks. In Proceedings of the 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 11–12 August 2016; pp. 321–326. [Google Scholar]
  78. Atamli, A.W.; Martin, A. Threat-Based Security Analysis for the Internet of Things. In Proceedings of the International Workshop on Secure Internet of Things, Wroclaw, Poland, 8–10 September 2014; pp. 35–43. [Google Scholar]
  79. Lu, Y.; Da Xu, L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2018, 6, 2103–2115. [Google Scholar] [CrossRef]
  80. Lin, H.; Bergmann, N.W. IoT Privacy and Security Challenges for Smart Home Environments. Information 2016, 7, 44. [Google Scholar] [CrossRef]
  81. Baccelli, E.; Gündoğan, C.; Hahm, O.; Kietzmann, P.; Lenders, M.S.; Petersen, H.; Schleiser, K.; Schmidt, T.C.; Wählisch, M. RIOT: An Open Source Operating System for Low-End Embedded Devices in the IoT. IEEE Internet Things J. 2018, 5, 4428–4440. [Google Scholar] [CrossRef]
  82. Eckmann, S.T.; Vigna, G.; Kemmerer, R.A. STATL: An Attack Language for State-based Intrusion Detection. J. Comput. Secur. 2002, 10, 71–103. [Google Scholar] [CrossRef]
  83. Andrea, I.; Chrysostomou, C.; Hadjichristofi, G. Internet of Things: Security Vulnerabilities and Challenges. In Proceedings of the IEEE symposium on computers and communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 180–187. [Google Scholar]
  84. Deogirikar, J.; Vidhate, A. Security Attacks in IoT: A Survey. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [Google Scholar]
  85. Mosenia, A.; Jha, N.K. A Comprehensive Study of Security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 2016, 5, 586–602. [Google Scholar] [CrossRef]
  86. He, D.; Chan, S.; Guizani, M. Security in the Internet of Things Supported by Mobile Edge Computing. IEEE Commun. Mag. 2018, 56, 56–61. [Google Scholar] [CrossRef]
  87. Social Engineering. Available online: https://www.imperva.com/learn/application-security/social-engineering-attack/ (accessed on 6 June 2021).
  88. Pirretti, M.; Zhu, S.; Vijaykrishnan, N.; McDaniel, P.; Kandemir, M.; Brooks, R. The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distrib. Sens. Netw. 2006, 2, 267–287. [Google Scholar] [CrossRef]
  89. Liu, D.; Yan, Z.; Ding, W.; Atiquzzaman, M. A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J. 2019, 6, 4946–4967. [Google Scholar] [CrossRef]
  90. Roman, R.; Lopez, J.; Mambo, M. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
  91. Gu, P.; Hua, C.; Xu, W.; Khatoun, R.; Wu, Y.; Serhrouchni, A. Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet Things J. 2020, 7, 5064–5077. [Google Scholar] [CrossRef]
  92. Khoo, B. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. In Proceedings of the International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Atlanta, GA, USA, 19–22 October 2011; pp. 709–712. [Google Scholar]
  93. Huang, W.; Zhang, Y.; Feng, Y. ACD: An Adaptable Approach for RFID Cloning Attack Detection. Sensors 2020, 20, 2378. [Google Scholar] [CrossRef]
  94. Farooq, M.U.; Waseem, M.; Khairi, A.; Mazhar, S. A Critical Analysis on the Security Concerns of Internet of Things (IoT). Int. J. Comput. Appl. 2015, 111, 1–6. [Google Scholar]
  95. Zhang, W.; Qu, B. Security Architecture of the Internet of Things Oriented to Perceptual Layer. Int. J. Comput. Consum. Control (IJ3C) 2013, 2, 37–45. [Google Scholar]
  96. Xiao, Q.; Gibbons, T.; Lebrun, H. RFID Technology, Security Vulnerabilities, and Countermeasures. In Supply Chain the Way to Flat Organization; Publisher-Intech: London, UK, 2009; pp. 357–382. [Google Scholar]
  97. Chen, K.; Zhang, S.; Li, Z.; Zhang, Y.; Deng, Q.; Ray, S.; Jin, Y. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2018, 2, 97–110. [Google Scholar] [CrossRef]
  98. Zhang, P.; Liu, J.; Shen, Y.; Li, H.; Jiang, X. Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities. IEEE Internet Things J. 2020, 7, 3977–3990. [Google Scholar] [CrossRef]
  99. Signori, A.; Chiariotti, F.; Campagnaro, F.; Zorzi, M. A Game-Theoretic and Experimental Analysis of Energy-Depleting Underwater Jamming Attacks. IEEE Internet Things J. 2020, 7, 9793–9804. [Google Scholar] [CrossRef]
  100. Letafati, M.; Kuhestani, A.; Wong, K.K.; Piran, M.J. A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer. IEEE Internet Things J. 2021, 8, 4373–4388. [Google Scholar] [CrossRef]
  101. Angle, M.G.; Madnick, S.; Kirtley, J.L.; Khan, S. Identifying and Anticipating Cyberattacks That Could Cause Physical Damage to Industrial Control Systems. IEEE Power Energy Technol. Syst. J. 2019, 6, 172–182. [Google Scholar] [CrossRef]
  102. Alladi, T.; Chamola, V.; Sikdar, B.; Choo, K.K.R. Consumer IoT: Security Vulnerability Case Sudies and Solutions. IEEE Consum. Electron. Mag. 2020, 9, 17–25. [Google Scholar] [CrossRef]
  103. Margulies, J. Garage Door Openers: An Internet of Things Case Study. IEEE Secur. Priv. 2015, 13, 80–83. [Google Scholar] [CrossRef]
  104. Yi, Y.; Zhang, Z.; Yang, L.T.; Deng, X.; Yi, L.; Wang, X. Social Interaction and Information Diffusion in Social Internet of Things: Dynamics, Cloud-Edge, Traceability. IEEE Internet Things J. 2021, 8, 2177–2192. [Google Scholar] [CrossRef]
  105. Hu, C.; Pu, Y.; Yang, F.; Zhao, R.; Alrawais, A.; Xiang, T. Secure and Efficient Data Collection and Storage of IoT in Smart Ocean. IEEE Internet Things J. 2020, 7, 9980–9994. [Google Scholar] [CrossRef]
  106. Li, B.; Ye, R.; Gu, G.; Liang, R.; Liu, W.; Cai, K. A Detection Mechanism on Malicious Nodes in IoT. Comput. Commun. 2020, 151, 51–59. [Google Scholar] [CrossRef]
  107. Fotohi, R.; Bari, S.F. A Novel Countermeasure Technique to Protect WSN against Denial-of-sleep Attacks using Firefly and Hopfield Neural Network (HNN) Algorithms. J. Supercomput. 2020, 76, 6860–6886. [Google Scholar] [CrossRef]
  108. Patil, B.; Agarkhed, J. An Exploratory Machine Learning Technique for Investigating Intrusion in Wireless Sensor Networks. In Proceedings of the IEEE Bangalore Humanitarian Technology Conference (B-HTC), Vijayapur, India, 8–10 October 2020; pp. 1–6. [Google Scholar] [CrossRef]
  109. Liu, Z.; Pen, J. The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection. In Proceedings of the IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; pp. 1075–1082. [Google Scholar] [CrossRef]
  110. Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
  111. Ai, X.; Chen, H.; Lin, K.; Wang, Z.; Yu, J. Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. IEEE Trans. Inf. Forensics Secur. 2021, 16, 714–727. [Google Scholar] [CrossRef]
  112. Burmester, M.; Munilla, J.; Ortiz, A. Comments on “Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems”. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2929–2931. [Google Scholar] [CrossRef]
  113. Gandino, F.; Montrucchio, B.; Rebaudengo, M. Tampering in RFID: A Survey on Risks and Defenses. Mob. Netw. Appl. 2010, 15, 502–516. [Google Scholar] [CrossRef]
  114. Sivasubramanian, N.; Konganathan, G. A Novel Semi Fragile Watermarking Technique for Tamper Detection and Recovery using IWT and DCT. Computing 2020, 102, 1365–1384. [Google Scholar] [CrossRef]
  115. Aman, M.N.; Sikdar, B.; Chua, K.C.; Ali, A. Low Power Data Integrity in IoT Systems. IEEE Internet Things J. 2018, 5, 3102–3113. [Google Scholar] [CrossRef]
  116. Numan, M.; Subhan, F.; Khan, W.Z.; Hakak, S.; Haider, S.; Reddy, G.T.; Jolfaei, A.; Alazab, M. A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks. IEEE Access 2020, 8, 65450–65461. [Google Scholar] [CrossRef]
  117. Zhou, B.; Li, S.; Wang, W.; Wang, J.; Cheng, Y.; Wu, J. An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs. IEEE Internet Things J. 2019, 6, 9738–9747. [Google Scholar] [CrossRef]
  118. Guo, S.; Wang, J.; Chen, Z.; Li, Y.; Lu, Z. Securing IoT Space via Hardware Trojan Detection. IEEE Internet Things J. 2020, 7, 11115–11122. [Google Scholar] [CrossRef]
  119. Chen, Z.; Guo, S.; Wang, J.; Li, Y.; Lu, Z. Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans. IEEE Internet Things J. 2019, 6, 7061–7068. [Google Scholar] [CrossRef]
  120. Bhushan, B.; Sahoo, G.; Rai, A.K. Man-in-the-Middle Attack in Wireless and Computer Networking—A Review. In Proceedings of the 3rd International Conference on Advances in Computing, Communication Automation (ICACCA) (Fall), Dehradun, India, 15–16 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
  121. Cryptanalysis. Available online: https://searchsecurity.techtarget.com/definition/cryptanalysis (accessed on 6 June 2021).
  122. Nia, A.M.; Sur-Kolay, S.; Raghunathan, A.; Jha, N.K. Physiological Information Leakage: A New Frontier in Health Information Security. IEEE Trans. Emerg. Top. Comput. 2015, 4, 321–334. [Google Scholar]
  123. Carluccio, D.; Lemke, K.; Paar, C. Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. In Proceedings of the ECrypt Workshop on RFID and Lightweight Crypto, Graz, Austria, 14–15 July 2005. [Google Scholar]
  124. Zhang, C.; Liu, Z.; Chen, Y.; Lu, J.; Liu, D. A Flexible and Generic Gaussian Sampler with Power Side-Channel Countermeasures for Quantum-Secure Internet of Things. IEEE Internet Things J. 2020, 7, 8167–8177. [Google Scholar] [CrossRef]
  125. Aboushosha, B.; Ramadan, R.A.; Dwivedi, A.D.; El-Sayed, A.; Dessouky, M.M. SLIM: A Lightweight Block Cipher for Internet of Health Things. IEEE Access 2020, 8, 203747–203757. [Google Scholar] [CrossRef]
  126. Liu, J.; Zhang, C.; Fang, Y. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis. IEEE Internet Things J. 2018, 5, 1206–1217. [Google Scholar] [CrossRef]
  127. Ahmed, M.M.; Dhavlle, A.; Mansoor, N.; Sutradhar, P.; Dinakarrao, S.M.P.; Basu, K.; Ganguly, A. Defense against on-chip Trojans Enabling Traffic Analysis Attacks. In Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Kolkata, India, 15–17 December 2020; pp. 1–6. [Google Scholar]
  128. Rfid Card Security and Attacks. Available online: https://www.sikich.com/insight/rfid-card-security-attacks-and-prevention/ (accessed on 6 June 2021).
  129. Zhen-hua, D.; Jin-tao, L.; Bo, F. A Taxonomy Model of RFID Security Threats. In Proceedings of the 11th IEEE International Conference on Communication Technology, Hangzhou, China, 19–21 November 2008. [Google Scholar]
  130. Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S. Classifying RFID Attacks and Defenses. Inf. Syst. Front. 2010, 12, 491–505. [Google Scholar] [CrossRef]
  131. Yang, Y.; Wei, X.; Xu, R.; Peng, L.; Zhang, L.; Ge, L. Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency. IEEE Access 2020, 8, 103860–103874. [Google Scholar] [CrossRef]
  132. Ahmad, F.; Kurugollu, F.; Adnane, A.; Hussain, R.; Hussain, F. MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles. IEEE Internet Things J. 2020, 7, 3310–3322. [Google Scholar] [CrossRef]
  133. Ghahramani, M.; Javidan, R.; Shojafar, M.; Taheri, R.; Alazab, M.; Tafazolli, R. RSS: An Energy-Efficient Approach for Securing IoT Service Protocols Against the DoS Attack. IEEE Internet Things J. 2021, 8, 3619–3635. [Google Scholar] [CrossRef]
  134. Borgiani, V.; Moratori, P.; Kazienko, J.F.; Tubino, E.R.R.; Quincozes, S.E. Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks within Industrial Internet of Things. IEEE Internet Things J. 2021, 8, 4569–4578. [Google Scholar] [CrossRef]
  135. Zaminkar, M.; Fotohi, R. SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wirel. Pers. Commun. 2020, 114, 1287–1312. [Google Scholar] [CrossRef]
  136. Liu, Y.; Ma, M.; Liu, X.; Xiong, N.N.; Liu, A.; Zhu, Y. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security. IEEE Trans. Netw. Sci. Eng. 2018, 7, 356–372. [Google Scholar] [CrossRef]
  137. Perazzo, P.; Vallati, C.; Anastasi, G.; Dini, G. DIO Suppression Attack against Routing in the Internet of Things. IEEE Commun. Lett. 2017, 21, 2524–2527. [Google Scholar] [CrossRef]
  138. Pu, C. Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses. IEEE Internet Things J. 2020, 7, 4937–4949. [Google Scholar] [CrossRef]
  139. Murali, S.; Jamalipour, A. A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things. IEEE Internet Things J. 2020, 7, 379–388. [Google Scholar] [CrossRef]
  140. Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet Things J. 2019, 6, 379–387. [Google Scholar] [CrossRef]
  141. Singh, V.P.; Jain, S.; Singhai, J. Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks. Int. J. Comput. Sci. Issues (IJCSI) 2010, 7, 23. [Google Scholar]
  142. Kaushik, I.; Sharma, N. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. In Collection of Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario’s; Springer: Berlin/Heidelberg, Germany, 2020; pp. 401–416. [Google Scholar]
  143. Abu Zant, M.; Yasin, A. Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). Secur. Commun. Netw. 2019, 2019, 8249108. [Google Scholar] [CrossRef]
  144. Raoof, A.; Matrawy, A.; Lung, C.H. Enhancing Routing Security in IoT: Performance Evaluation of RPL’s Secure Mode Under Attacks. IEEE Internet Things J. 2020, 7, 11536–11546. [Google Scholar] [CrossRef]
  145. Stute, M.; Agarwal, P.; Kumar, A.; Asadi, A.; Hollick, M. LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems. IEEE Internet Things J. 2020, 7, 6802–6816. [Google Scholar] [CrossRef]
  146. Deshmukh-Bhosale, S.; Sonavane, S.S. A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things. Procedia Manuf. 2019, 32, 840–847. [Google Scholar] [CrossRef]
  147. Li, F.; Ren, P.; Yang, G.; Sun, Y.; Wang, Y.; Wang, Y.; Li, S.; Zhou, H. An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Secur. Commun. Netw. 2021, 2021, 6670847. [Google Scholar] [CrossRef]
  148. Chen, H.; Ai, X.; Lin, K.; Yan, N.; Wang, Z.; Jiang, N.; Yu, J. DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Ind. Inform. 2021, 18, 345–355. [Google Scholar] [CrossRef]
  149. Shen, H.; Shen, J.; Khan, M.K.; Lee, J.H. Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things. Wirel. Pers. Commun. 2017, 96, 5253–5266. [Google Scholar] [CrossRef]
  150. Ding, H.; Han, J.; Zhang, Y.; Xiao, F.; Xi, W.; Wang, G.; Jiang, Z. Preventing Unauthorized Access on Passive Tags. In Proceedings of the IEEE INFOCOM—IEEE Conference on Computer Communications, Honolulu, HI, USA, 15–19 April 2018; pp. 1115–1123. [Google Scholar] [CrossRef]
  151. Allah, O.A.; Abdalla, S.; Mekki, M.; Awadallah, A. RFID based Access Control and Registration System. In Proceedings of the International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 12–14 August 2018; pp. 1–4. [Google Scholar] [CrossRef]
  152. Puthal, D.; Nepal, S.; Ranjan, R.; Chen, J. Threats to Networking Cloud and Edge Datacenters in the Internet of Things. IEEE Cloud Comput. 2016, 3, 64–71. [Google Scholar] [CrossRef]
  153. Tian, Q.; Lin, Y.; Guo, X.; Wen, J.; Fang, Y.; Rodriguez, J.; Mumtaz, S. New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint. IEEE Internet Things J. 2019, 6, 7980–7987. [Google Scholar] [CrossRef]
  154. Deng, J.; Han, R.; Mishra, S. Defending against Path-based DoS Attacks in Wireless Sensor Networks. In Proceedings of the the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Los Angeles, CA, USA, 7–11 November 2005; pp. 89–96. [Google Scholar]
  155. Gupta, H.P.; Rao, S.; Yadav, A.K.; Dutta, T. Geographic Routing in Clustered Wireless Sensor Networks Among Obstacles. IEEE Sens. J. 2014, 15, 2984–2992. [Google Scholar] [CrossRef]
  156. Wang, Y.C.; Tseng, Y.C. Attacks and Defenses of Routing Mechanisms in ad hoc and Sensor Networks. In Security in Sensor Networks; CRC Press: Boca Raton, FL, USA, 2007; pp. 3–25. [Google Scholar]
  157. Junejo, A.K.; Komninos, N.; McCann, J.A. A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems. IEEE Internet Things J. 2021, 8, 6840–6852. [Google Scholar] [CrossRef]
  158. Shafique, U.; Khan, A.; Rehman, A.; Bashir, F.; Alam, M. Detection of Rank Attack in Routing Protocol for Low Power and Lossy Networks. Ann. Telecommun. 2018, 73, 429–438. [Google Scholar] [CrossRef]
  159. Sarigiannidis, P.; Karapistoli, E.; Economides, A.A. Detecting Sybil Attacks in Wireless Sensor Networks using UWB Ranging-based Information. Expert Syst. Appl. 2015, 42, 7560–7572. [Google Scholar] [CrossRef]
  160. Zhang, Y.; Liu, W.; Lou, W.; Fang, Y. Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2006, 24, 247–260. [Google Scholar] [CrossRef]
  161. Garg, S.; Kaur, K.; Kaddoum, G.; Choo, K.K.R. Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. IEEE Internet Things J. 2020, 7, 4598–4606. [Google Scholar] [CrossRef]
  162. Zhang, N.; Fang, X.; Wang, Y.; Wu, S.; Wu, H.; Kar, D.; Zhang, H. Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding. IEEE Internet Things J. 2020, 7, 9001–9010. [Google Scholar] [CrossRef]
  163. Cakir, S.; Toklu, S.; Yalcin, N. RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning. IEEE Access 2020, 8, 183678–183689. [Google Scholar] [CrossRef]
  164. Lai, W.K.; Chiu, C.T. Probabilistic Second-Chance Broadcasting with/without Global Positioning System Information in Wireless Ad Hoc Networks. IEEE Access 2020, 8, 212608–212622. [Google Scholar] [CrossRef]
  165. Yang, J.; Li, T.; Liang, G.; Wang, Y.; Gao, T.; Zhu, F. Spam Transaction Attack Detection Model based on GRU and WGAN-div. Comput. Commun. 2020, 161, 172–182. [Google Scholar] [CrossRef]
  166. Kumar, A.; Varadarajan, V.; Kumar, A.; Dadheech, P.; Choudhary, S.S.; Kumar, V.A.; Panigrahi, B.K.; Veluvolu, K.C. Black hole Attack Detection in Vehicular ad-hoc Network using Secure AODV Routing Algorithm. Microprocess. Microsystems 2021, 80, 103352. [Google Scholar] [CrossRef]
  167. Yang, N.; Chen, K.; Wang, M. SmartDetour: Defending Blackhole and Content Poisoning Attacks in IoT NDN Networks. IEEE Internet Things J. 2021, 8, 12119–12136. [Google Scholar] [CrossRef]
  168. Yu, B.; Xiao, B. Detecting Selective Forwarding aAttacks in Wireless Sensor Networks. In Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes, Greece, 25–29 April 2006; p. 8. [Google Scholar]
  169. Wang, G.; Zhang, W.; Cao, G.; La Porta, T. On Supporting Distributed Collaboration in Sensor Networks. In Proceedings of the IEEE Military Communications Conference, MILCOM, Boston, MA, USA, 13–16 April 2003; Volume 2, pp. 752–757. [Google Scholar]
  170. Xie, B.; Liu, M. Dynamics Stability and Optimal Control of Virus Propagation Based on the E-Mail Network. IEEE Access 2021, 9, 32449–32456. [Google Scholar] [CrossRef]
  171. Khan, N.; Abdullah, J.; Khan, A.S. Defending Malicious Script Attacks Using Machine Learning Classifiers. Wirel. Commun. Mob. Comput. 2017, 2017, 5360472. [Google Scholar] [CrossRef]
  172. Rodríguez, G.E.; Torres, J.G.; Flores, P.; Benavides, D.E. Cross-site Scripting (XSS) Attacks and Mitigation: A Survey. Comput. Netw. 2020, 166, 106960. [Google Scholar] [CrossRef]
  173. Mallikarajunan, K.N.; Preethi, S.; Selvalakshmi, S.; Nithish, N. Detection of Spyware in Software Using Virtual Environment. In Proceedings of the 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1138–1142. [Google Scholar] [CrossRef]
  174. Bhunia, S.; Hsiao, M.S.; Banga, M.; Narasimhan, S. Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proc. IEEE 2014, 102, 1229–1247. [Google Scholar] [CrossRef]
  175. Daia, A.S.A.; Ramadan, R.A.; Fayek, M.B.; AETiC, A. Sensor Networks Attacks Classifications and Mitigation. Ann. Emerg. Technol. Comput. (Aetic) 2018, 2, 28–43. [Google Scholar] [CrossRef]
  176. Šimon, M.; Huraj, L.; Horák, T. DDoS reflection attack based on IoT: A case study. In Proceedings of the Computer Science On-line Conference, Las Vegas, NV, USA, 12–14 December 2018; pp. 44–52. [Google Scholar]
  177. Horak, T.; Cervenanska, Z.; Huraj, L.; Vazan, P.; Janosik, J.; Tanuska, P. The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept. IFAC-PapersOnLine 2020, 53, 11237–11242. [Google Scholar] [CrossRef]
  178. Nuiaa, R.R.; Manickam, S.; Alsaeedi, A.H. Distributed reflection denial of service attack: A critical review. Int. J. Electr. Comput. Eng. 2021, 11, 5327. [Google Scholar] [CrossRef]
  179. Huraj, L.; Horak, T.; Strelec, P.; Tanuska, P. Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci. 2021, 11, 1847. [Google Scholar] [CrossRef]
  180. Bettayeb, M.; Nasir, Q.; Talib, M.A. Firmware Update aAttacks and Security for IoT Devices: Survey. In Proceedings of the the ArabWIC 6th Annual International Conference Research Track, Rabat, Morocco, 7–9 March 2019; pp. 1–6. [Google Scholar]
  181. Mahjabin, T.; Xiao, Y.; Li, T.; Chen, C.L.P. Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks. IEEE Internet Things J. 2020, 7, 986–1000. [Google Scholar] [CrossRef]
  182. Habibi, J.; Midi, D.; Mudgerikar, A.; Bertino, E. Heimdall: Mitigating the Internet of Insecure Things. IEEE Internet Things J. 2017, 4, 968–978. [Google Scholar] [CrossRef]
  183. Stiawan, D.; Idris, M.; Malik, R.F.; Nurmaini, S.; Alsharif, N.; Budiarto, R. Investigating Brute Force Attack Patterns in IoT Network. J. Electr. Comput. Eng. 2019, 2019, 4568368. [Google Scholar] [CrossRef]
  184. Wu, M.; Miller, R.C.; Garfinkel, S.L. Do Security Toolbars actually Prevent Phishing Attacks? In Proceedings of the the SIGCHI Conference on Human Factors in Computing Systems, Montréal, QC, Canada, 22–27 April 2006; pp. 601–610. [Google Scholar]
  185. Hong, J. The State of Phishing Attacks. Commun. ACM 2012, 55, 74–81. [Google Scholar] [CrossRef]
  186. Acharya, J.; Chuadhary, A.; Chhabria, A.; Jangale, S. Detecting Malware, Malicious URLs and Virus Using Machine Learning and Signature Matching. In Proceedings of the 2nd International Conference for Emerging Technology (INCET), Belagavi, India, 21–23 May 2021; pp. 1–5. [Google Scholar] [CrossRef]
  187. Wang, G.; Xie, S.; Zhang, X.; Gao, J.; Wei, F.; Zhao, B.; Wang, C.; Lv, S. An Effective Method to Safeguard Cyber Security by Preventing Malicious Data. IEEE Access 2019, 7, 166282–166291. [Google Scholar] [CrossRef]
  188. Suryati, O.T.; Budiono, A. Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method. Int. J. Adv. Data Inf. Syst. 2020, 1, 1–8. [Google Scholar] [CrossRef]
  189. Pan, Y.; Zhang, L.; Huang, D. Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution. Appl. Sci. 2020, 10, 7788. [Google Scholar] [CrossRef]
  190. Insecurity of Things: The IoT Devices You Deploy May Be Trojan Horses. Available online: https://venturebeat.com/2016/04/17/insecurity-of-things-the-iot-devices-you-deploy-may-be-trojan-horses/ (accessed on 6 June 2021).
  191. Khan, H.A.; Sehatbakhsh, N.; Nguyen, L.N.; Callan, R.L.; Yeredor, A.; Prvulovic, M.; Zajić, A. IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1150–1163. [Google Scholar] [CrossRef]
  192. Jagadeesan, S.; Amutha, B. An Efficient Botnet Detection with the Enhanced Support Vector Neural Network. Measurement 2021, 176, 109140. [Google Scholar] [CrossRef]
  193. Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks. IEEE Internet Things J. 2021, 8, 4944–4956. [Google Scholar] [CrossRef]
  194. Salamatian, S.; Huleihel, W.; Beirami, A.; Cohen, A.; Médard, M. Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3749–3759. [Google Scholar] [CrossRef]
  195. Alsaleh, M.; Mannan, M.; van Oorschot, P.C. Revisiting Defenses against Large-Scale Online Password Guessing Attacks. IEEE Trans. Dependable Secur. Comput. 2012, 9, 128–141. [Google Scholar] [CrossRef]
  196. Ali, M.; Baloch, A.; Waheed, A.; Zareei, M.; Manzoor, R.; Sajid, H.; Alanazi, F. A Simple and Secure Reformation-Based Password Scheme. IEEE Access 2021, 9, 11655–11674. [Google Scholar] [CrossRef]
  197. Gutierrez, C.N.; Kim, T.; Corte, R.D.; Avery, J.; Goldwasser, D.; Cinque, M.; Bagchi, S. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Trans. Dependable Secur. Comput. 2018, 15, 988–1001. [Google Scholar] [CrossRef]
  198. Alsariera, Y.A.; Adeyemo, V.E.; Balogun, A.O.; Alazzawi, A.K. AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites. IEEE Access 2020, 8, 142532–142542. [Google Scholar] [CrossRef]
  199. Gerjuoy, E. Shor’s Factoring Algorithm and Modern Cryptography. An Illustration of the Capabilities Inherent in Quantum Computers. Am. J. Phys. 2005, 73, 521–540. [Google Scholar] [CrossRef]
  200. Cultice, T.; Thapliyal, H. PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security. Information 2022, 13, 382. [Google Scholar] [CrossRef]
  201. Khaliq, A.A.; Anjum, A.; Ajmal, A.B.; Webber, J.L.; Mehbodniya, A.; Khan, S. A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy. IEEE Access 2022, 10, 56410–56426. [Google Scholar] [CrossRef]
  202. Barker, E.; Roginsky, A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. NIST Spec. Publ. 2011, 800, 131A. [Google Scholar]
  203. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Novel FinFET Based Physical Unclonable Functions for Efficient Security Integration in the IoT. In Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India, 19–21 December 2016; pp. 172–177. [Google Scholar]
  204. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E. Making Use of Manufacturing Process Variations: A Dopingless Transistor Based-PUF for Hardware-Assisted Security. IEEE Trans. Semicond. Manuf. 2018, 31, 285–294. [Google Scholar] [CrossRef]
  205. Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon Physical Random Functions. In Proceedings of the the 9th ACM Conference on Computer and Communications Security, Washingtion, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
  206. Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. PIM: A PUF-Based Host Tracking Protocol for Privacy Aware Contact Tracing in Crowded Areas. IEEE Consum. Electron. Mag. 2021, 10, 90–98. [Google Scholar] [CrossRef]
  207. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Singh, J. Secure Multi-key Generation Using Ring Oscillator Based Physical Unclonable Function. In Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Gwalior, India, 19–21 December 2016; pp. 200–205. [Google Scholar]
  208. Joshi, S.; Mohanty, S.P.; Kougianos, E. Everything You Wanted to Know about PUFs. IEEE Potentials 2017, 36, 38–46. [Google Scholar] [CrossRef]
  209. Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A.; Yelamarthi, K. Performance Analysis of Ring Oscillator PUF for Robust Security in Smart Transportation. In Proceedings of the IEEE 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 14 June–31 July 2021; pp. 301–302. [Google Scholar]
  210. Maitra, S.; Yanambaka, V.P.; Abdelgawad, A.; Puthal, D.; Yelamarthi, K. Proof-of-Authentication Consensus Algorithm: Blockchain-based IoT Implementation. In Proceedings of the IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–6 June 2020; pp. 1–2. [Google Scholar]
  211. Puthal, D.; Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E. PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks. arXiv 2020, arXiv:2001.07297. [Google Scholar]
  212. Mohanta, B.K.; Jena, D.; Ramasubbareddy, S.; Daneshmand, M.; Gandomi, A.H. Addressing Security and Privacy Issues of IoT Using Blockchain Technology. IEEE Internet Things J. 2020, 8, 881–888. [Google Scholar] [CrossRef]
  213. Singh, R.; Dwivedi, A.D.; Srivastava, G. Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention. Sensors 2020, 20, 3951. [Google Scholar] [CrossRef]
  214. Guo, L.; Dong, M.; Ota, K.; Li, Q.; Ye, T.; Wu, J.; Li, J. A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle. IEEE Internet Things J. 2017, 4, 601–610. [Google Scholar] [CrossRef]
  215. Li, J.; Ji, Y.; Choo, K.K.R.; Hogrefe, D. CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2019, 6, 10332–10343. [Google Scholar] [CrossRef]
  216. Yasuda, M.; Shimoyama, T.; Kogure, J.; Izu, T. Computational hardness of IFP and ECDLP. Appl. Algebra Eng. Commun. Comput. 2016, 27, 493–521. [Google Scholar] [CrossRef]
  217. Maurer, U.; Wolf, S. Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms. In Proceedings of the 1998 IEEE International Symposium on Information Theory (Cat. No. 98CH36252), Cambridge, MA, USA, 16–21 August 1998; p. 327. [Google Scholar]
  218. Kerrache, C.A.; Lagraa, N.; Hussain, R.; Ahmed, S.H.; Benslimane, A.; Calafate, C.T.; Cano, J.C.; Vegni, A.M. TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles. IEEE Internet Things J. 2018, 6, 5870–5877. [Google Scholar] [CrossRef]
  219. Al-Absi, M.A.; Al-Absi, A.A.; Fu, R.; Kim, K.H.; Lee, Y.S.; Lee, B.G.; Lee, S.G.; Lee, H.J. Secure and Efficient High Throughput Medium Access Control for Vehicular Ad-Hoc Network. Sensors 2021, 21, 4935. [Google Scholar] [CrossRef]
  220. Ambika, R.; Ramachandran, S.; Kashwan, K.R. Data Security using Serial Commutative RSA CORE for Multiple FPGA System. In Proceedings of the 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 6–8 March 2014; pp. 1–5. [Google Scholar] [CrossRef]
  221. Meshram, C.; Ibrahim, R.W.; Deng, L.; Shende, S.W.; Meshram, S.G.; Barve, S.K. A Robust Smart Card and Remote User Password-based Authentication Protocol using Extended Chaotic Maps under Smart Cities Environment. Soft Comput. 2021, 25, 10037–10051. [Google Scholar] [CrossRef]
  222. Han, M.; Zhu, M.; Cheng, P.; Yin, Z.; Qu, H. Implementing an Efficient Secure Attribute-Based Encryption System for IoV Using Association Rules. Symmetry 2021, 13, 1177. [Google Scholar] [CrossRef]
  223. Hwang, Y.W.; Lee, I.Y. A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment. Sensors 2020, 20, 4934. [Google Scholar] [CrossRef]
  224. Huang, P.; Guo, L.; Li, M.; Fang, Y. Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare. IEEE Internet Things J. 2019, 6, 9200–9210. [Google Scholar] [CrossRef]
  225. Koblitz, N. Elliptic Curve Cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  226. Black, J.R., Jr. Message Authentication Codes; University of California: Davis, CA, USA, 2000. [Google Scholar]
  227. Siddiqi, M.A.; Doerr, C.; Strydis, C. IMDfence: Architecting a Secure Protocol for Implantable Medical Devices. IEEE Access 2020, 8, 147948–147964. [Google Scholar] [CrossRef]
  228. Hahn, C.; Kwon, H.; Hur, J. Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems. IEEE Internet Things J. 2018, 6, 6301–6309. [Google Scholar] [CrossRef]
  229. Wazid, M.; Bagga, P.; Das, A.K.; Shetty, S.; Rodrigues, J.J.; Park, Y. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet Things J. 2019, 6, 8804–8817. [Google Scholar] [CrossRef]
  230. Wu, F.; Zhang, X.; Zhang, C.; Chen, X.; Fan, W.; Liu, Y. Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks. IEEE Internet Things J. 2020, 7, 8144–8156. [Google Scholar] [CrossRef]
  231. Thumbur, G.; Rao, G.S.; Reddy, P.V.; Gayathri, N.; Reddy, D.K.; Padmavathamma, M. Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Internet Things J. 2020, 8, 1908–1920. [Google Scholar] [CrossRef]
  232. Zhang, J.; Zhong, H.; Cui, J.; Xu, Y.; Liu, L. An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks. IEEE Internet Things J. 2020, 7, 3462–3473. [Google Scholar] [CrossRef]
  233. Ghahramani, M.; Javidan, R.; Shojafar, M. A Secure Biometric-based Authentication Protocol for Global Mobility Networks in Smart Cities. J. Supercomput. 2020, 76, 8729–8755. [Google Scholar] [CrossRef]
  234. Li, X.; Niu, J.; Kumari, S.; Wu, F.; Choo, K.K.R. A Robust Biometrics based Three-factor Authentication Scheme for Global Mobility Networks in Smart City. Future Gener. Comput. Syst. 2018, 83, 607–618. [Google Scholar] [CrossRef]
  235. Xie, Q.; Li, K.; Tan, X.; Han, L.; Tang, W.; Hu, B. A Secure and Privacy-Preserving Authentication Protocol for Wireless Sensor Networks in Smart City. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
  236. Banerjee, S.; Chunka, C.; Sen, S.; Goswami, R.S. An Enhanced and Secure Biometric based User Authentication Scheme in Wireless Sensor Networks using Smart Cards. Wirel. Pers. Commun. 2019, 107, 243–270. [Google Scholar] [CrossRef]
  237. Xiao, L.; Cai, J.; Qiu, M.; Liu, M. A Secure Identity Authentication Protocol for Edge Data in Smart Grid Environment. In Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Washington DC, USA, 26–28 July 2021; pp. 188–193. [Google Scholar]
  238. Chen, C.M.; Chen, L.; Huang, Y.; Kumar, S.; Wu, J.M.T. Lightweight Authentication Protocol in Edge-based Smart Grid Environment. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 119. [Google Scholar] [CrossRef]
  239. Srinivas, J.; Das, A.K.; Wazid, M.; Vasilakos, A.V. Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System. IEEE Internet Things J. 2021, 8, 7727–7744. [Google Scholar] [CrossRef]
  240. Velliangiri, S.; Manoharn, R.; Ramachandran, S.; Venkatesan, K.; Rajasekar, V.; Karthikeyan, P.; Kumar, P.; Kumar, A.; Dhanabalan, S.S. An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based on Elliptic Curve Cryptography. IEEE Trans. Ind. Inform. 2022, 18, 6494–6502. [Google Scholar] [CrossRef]
  241. Ryu, J.; Oh, J.; Kwon, D.; Son, S.; Lee, J.; Park, Y.; Park, Y. Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System. IEEE Access 2022, 10, 11511–11526. [Google Scholar] [CrossRef]
  242. Ali, I.; Chen, Y.; Pan, C.; Zhou, A. ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications. IEEE Internet Things J. 2022, 9, 4435–4450. [Google Scholar] [CrossRef]
  243. Sharma, P.; Liu, H. A Machine-Learning-Based Data-Centric Misbehavior Detection Model for Internet of Vehicles. IEEE Internet Things J. 2020, 8, 4991–4999. [Google Scholar] [CrossRef]
  244. Pascale, F.; Adinolfi, E.A.; Coppola, S.; Santonicola, E. Cybersecurity in Automotive: An Intrusion Detection System in Connected Vehicles. Electronics 2021, 10, 1765. [Google Scholar] [CrossRef]
  245. Pradeep, R.; Sunitha, N. Formal Verification of CHAP PPP Authentication Protocol for Smart City/Safe City Applications. J. Phys. Conf. 2022, 2161, 012046. [Google Scholar] [CrossRef]
  246. Wang, L.; Liu, X. NOTSA: Novel OBU with Three-Level Security Architecture for Internet of Vehicles. IEEE Internet Things J. 2018, 5, 3548–3558. [Google Scholar] [CrossRef]
  247. Alladi, T.; Chakravarty, S.; Chamola, V.; Guizani, M. A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario. IEEE Trans. Veh. Technol. 2020, 69, 14188–14197. [Google Scholar] [CrossRef]
  248. Aman, M.N.; Javaid, U.; Sikdar, B. A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2020, 8, 1123–1139. [Google Scholar] [CrossRef]
  249. Alladi, T.; Bansal, G.; Chamola, V.; Guizani, M. SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. IEEE Trans. Veh. Technol. 2020, 69, 15068–15077. [Google Scholar] [CrossRef]
  250. Yanambaka, V.P.; Mohanty, S.P.; Kougianos, E.; Puthal, D. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things. IEEE Trans. Consum. Electron. 2019, 65, 388–397. [Google Scholar] [CrossRef]
  251. Badar, H.M.S.; Qadri, S.; Shamshad, S.; Ayub, M.F.; Mahmood, K.; Kumar, N. An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function. IEEE Trans. Smart Grid 2021, 12, 4426–4434. [Google Scholar] [CrossRef]
  252. Tanveer, M.; Shah, H.; Alkhayyat, A.; Chaudhry, S.A.; Ahmad, M. ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids. IEEE Access 2021, 9, 143366–143377. [Google Scholar] [CrossRef]
  253. Lee, T.F.; Ye, X.; Lin, S.H. Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things. IEEE Internet Things J. 2022, 9, 15336–15348. [Google Scholar] [CrossRef]
  254. Jiang, T.; Fang, H.; Wang, H. Blockchain-Based Internet of Vehicles: Distributed Network Architecture and Performance Analysis. IEEE Internet Things J. 2018, 6, 4640–4649. [Google Scholar] [CrossRef]
  255. Liu, K.; Chen, W.; Zheng, Z.; Li, Z.; Liang, W. A Novel Debt-Credit Mechanism for Blockchain-Based Data-Trading in Internet of Vehicles. IEEE Internet Things J. 2019, 6, 9098–9111. [Google Scholar] [CrossRef]
  256. Yin, B.; Wu, Y.; Hu, T.; Dong, J.; Jiang, Z. An Efficient Collaboration and Incentive Mechanism for Internet of Vehicles (IoV) with Secured Information Exchange Based on Blockchains. IEEE Internet Things J. 2019, 7, 1582–1593. [Google Scholar] [CrossRef]
  257. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
  258. Gao, J.; Agyekum, K.O.B.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 2019, 7, 4278–4291. [Google Scholar] [CrossRef]
  259. Xu, X.; Zhao, H.; Yao, H.; Wang, S. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet Things J. 2020, 8, 2431–2443. [Google Scholar] [CrossRef]
  260. Javaid, U.; Aman, M.N.; Sikdar, B. A Scalable Protocol for Driving Trust Management in Internet of Vehicles with Blockchain. IEEE Internet Things J. 2020, 7, 11815–11829. [Google Scholar] [CrossRef]
  261. Vivekanandan, M.; Sastry, V.N.; Srinivasulu Reddy, U. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 2021, 14, 403–419. [Google Scholar] [CrossRef]
  262. Wang, W.; Qiu, C.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things J. 2021, 9, 8883–8891. [Google Scholar] [CrossRef]
  263. Son, S.; Lee, J.; Park, Y.; Park, Y.; Das, A.K. Design of Blockchain-Based Lightweight V2I Handover Authentication Protocol for VANET. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1346–1358. [Google Scholar] [CrossRef]
  264. Yang, Y.; Wei, L.; Wu, J.; Long, C.; Li, B. A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network. IEEE Internet Things J. 2022, 9, 8078–8090. [Google Scholar] [CrossRef]
  265. Cheng, G.; Chen, Y.; Deng, S.; Gao, H.; Yin, J. A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing. IEEE Trans. Comput. Soc. Syst. 2022, 9, 146–158. [Google Scholar] [CrossRef]
  266. Chow, S.S.; Boyd, C.; Nieto, J.M.G. Security-mediated Certificateless Cryptography. In Proceedings of the International Workshop on Public Key Cryptography, New York, NY, USA, 24–26 April 2006; pp. 508–524. [Google Scholar]
  267. Huang, D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. Int. J. Secur. Netw. 2007, 2, 272–283. [Google Scholar] [CrossRef]
  268. Xu, Z.; Li, F.; Deng, H.; Tan, M.; Zhang, J.; Xu, J. A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol. Sensors 2020, 20, 4835. [Google Scholar] [CrossRef]
  269. Xu, Z.; Liang, W.; Li, K.C.; Xu, J.; Zomaya, A.Y.; Zhang, J. A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0. IEEE Trans. Ind. Inform. 2022, 18, 7118–7127. [Google Scholar] [CrossRef]
Figure 1. Paper Organization.
Figure 1. Paper Organization.
Sensors 22 07433 g001
Figure 2. IoT Application.
Figure 2. IoT Application.
Sensors 22 07433 g002
Figure 3. IoT Elements and Paradigm.
Figure 3. IoT Elements and Paradigm.
Sensors 22 07433 g003
Figure 4. Generalized IoT Architecture.
Figure 4. Generalized IoT Architecture.
Sensors 22 07433 g004
Figure 5. IoE Components.
Figure 5. IoE Components.
Sensors 22 07433 g005
Figure 6. Generalized IoE Architecture.
Figure 6. Generalized IoE Architecture.
Sensors 22 07433 g006
Figure 7. Security Taxonomy.
Figure 7. Security Taxonomy.
Sensors 22 07433 g007
Figure 8. Hardware attack and Software attack.
Figure 8. Hardware attack and Software attack.
Sensors 22 07433 g008
Figure 9. IoT devices attack pyramid based on effects and vulnerabilities.
Figure 9. IoT devices attack pyramid based on effects and vulnerabilities.
Sensors 22 07433 g009
Figure 10. Hardware-based security mechanisms.
Figure 10. Hardware-based security mechanisms.
Sensors 22 07433 g010
Figure 11. Characteristics of PUF.
Figure 11. Characteristics of PUF.
Sensors 22 07433 g011
Figure 12. Basic structure of blockchain block.
Figure 12. Basic structure of blockchain block.
Sensors 22 07433 g012
Table 1. Acronyms used in the paper.
Table 1. Acronyms used in the paper.
NotationsDescriptionNotationsDescriptionNotationsDescription
IPInternet ProtocolIoMTInternet of Medical ThingsIoVInternet of Vehicles
SGSmart gridPUFPhysical unclonable functionV2XVehicle-to-everything
V2VVehicle-to-vehicleVANETVehicular Adhoc NetworkV2SVehicle-to-sensors
V2IVehicle-to-infrastructureV2NVehicle-to-networkV2PVehicle-to-pedestrian
RFIDRadio-frequency identificationWiFiWireless FidelityNFCNear-field communication
GPSGlobal Positioning SystemLTELong-Term EvolutionMACMedia Access Control
M2MMachine to machineM2HMachine to humanH2HHuman to human
DoSDenial-of-serviceDDoSDistributed denial of serviceBFABrute force attack
PUFPhysical unclonable functionsPKIPublic Key InfrastructureAESAdvanced encryption standard
ABEAttribute BasedMACMessage Authentication CodeECCElliptic Curve Cryptography
RSARivest–Shamir–AdlemanPoWProof of workPoSProof-of-Stake
Table 2. Comparative analysis of related works.
Table 2. Comparative analysis of related works.
SurveyCitationYearObjective
Understanding security requirements and challenges in Internet of ThingsHameed et al. [30]2019Security vulnerabilities are classified; challenges, existing solutions and open research issues are highlighted.
Survey on blockchain for Internet of ThingsWang et al. [40]2019Blockchain data structure and consensus protocol enhancement related existing works.
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoTSengupta et al. [11]2019Categorize IoT attacks and countermeasures; Detailed IoT and IIoT application-specific blockchain-based solutions.
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT ExploitationsNeshenko et al. [26]2019IoT taxonomy, effects and remediation.
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT DevicesMeneghello et el. [35]2019The security measures used by the most prevalent IoT communication protocols, as well as their flaws.
Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive SurveyRafique et al. [37]2020SDN and edge computing for limited resources computed intensive tasks.
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) SecurityAl-Garadi et al. [27]2020IoT security threats and solutions using machine learning and deep learning.
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A SurveySharma et al. [28]2020Threats and countermeasures comparison of existing works for Smart Mobile-Internet of Things.
From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of ThingsFernández-Caramés et al. [31]2020Comparison of traditional and quantum security vulnerability and impacts.
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open IssuesStoyanova et al. [32]2020Discussed present challenges and solution of IoT forensics.
A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless SystemsChettri et al. [33]20205G layers, effect of 5G on IoT and review on low-power wide-area network for 5G.
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging TechnologiesFriha et al. [38]2021Emerging technology like SDN, NFV, Blockchain in the smart agriculture related application.
A Survey on the Integration of Blockchain with IoT to Enhance Performance and Eliminate ChallengesSadawi et al. [41]2021Challenges and attacks resistance using blockchain technology.
Applications of the Internet of Things (IoT) in Smart Logistics: A Comprehensive SurveySong et al. [36]2021How IoT can be applied in smart logistics.
A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of ThingsAlwarafy [39]2021Improvement of data processing and resistance of attacks using edge-computing.
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A SurveyKhan et al. [34]2021Discussed IoT architecture and lightweight cryptographic protocols.
Public Blockchains for Resource-Constrained IoT Devices—A State-of-the-Art SurveyKhor et al. [42]2021Discuss the blockchain technology solutions and how it can be used in resource constraint devices.
Machine Learning-Based Security Solutions for Healthcare: An OverviewArora et al. [43]2022Healthcare security solutions using machine learning.
Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive SurveyBarua et al. [29]2022Security threats, taxonomy and solutions for Bluetooth based attack.
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information systemGaurav et al. [44]2022Machine learning based malware detection in the IoT network.
This Paper--Provided overview and comparison of IoT and IoE network; Provided overview of different IoT applications; Details discussion of IoT taxonomy, effects, and countermeasures; Centralized and blockchain based existing security solutions discussion in depth of IoT applications.
Table 3. IoT devices security constraints.
Table 3. IoT devices security constraints.
Hardware LimitationSoftware LimitationNetwork Limitation
Computational and energy constraintEmbedded software constraintMobility
Memory constraintDynamic security patchScalability
Tamper resistant packaging Multiplicity of communication medium
Multi-Protocol Networking
Dynamic network topology
Table 4. IoT Security Requirements.
Table 4. IoT Security Requirements.
Security RequirementsDefinitionAbbreviations
ConfidentialityThe process in which secret and confidential of the on-air and stored information is strictly preserved and only permitted objects or users have access to it.C
IntegrityThe process in which there is no alternation of data and accuracy is taken care of.I
NonrepudiationThe procedure through which an IoT system verifies an event’s legitimacy and origin.NR
AvailabilityThe process of making sure services are accessible to who needs them, even if there is a power outage or a breakdown.A
PrivacyThe method by which an IoT system is to access private data by following rules and policies.P
AuditabilityThe process by which an IoT system monitors it actions.AU
AccountabilityThe mechanism through which IoT system users will be responsible for their actions.AC
TrustworthinessThe method through which an IoT system can verify an individual’s identification and establish trust in a third party.TW
Table 5. Attacks against the various layers of the IoT network.
Table 5. Attacks against the various layers of the IoT network.
Physical AttacksEncryption AttacksNetwork AttacksApplication Attacks
Node JammingMan In The Middle AttackTraffic Analysis AttacksVirus and Worms
Physical DamageSide Channel AttacksRFID SpoofingMalicious Scripts
Node TamperingCryptanalysis AttacksRFID CloningSpyware and Adware
Social Engineering RFID Unauthorized AccessTrojan Horse
Malicious Node Injection Man In the Middle AttackDenial of Service
Sleep Deprivation Attack Denial of ServiceFirmware Hijacking
Malicious Code Injection Sinkhole AttackBotnet Attack
RF Interference Routing Information AttackBrute Force Password Attack
Tag Cloning Sybil AttackPhishing Attacks
Eavesdropping Replay Attack
Tag Tampering Hello Flood Attack
Outage attack Blackmail Attack
Object replication Blackhole Attack
Hardware Trojan Wormhole Attack
Grayhole Attack
Table 6. Physical attacks with compromised security goals and countermeasures.
Table 6. Physical attacks with compromised security goals and countermeasures.
Physical AttacksCompromised Security RequirementsEffectsCountermeasures
Node JammingALLCommunication disruption, Reducing lifetime [99]Frequency hopping [100], Game theory [99], Spread Spectrum, lower duty cycle, priority messages, region mapping
Physical DamageALLHardware control, Confidential information leakage [101]Secure physical design, tamper proof and self-destruction
Node TamperingALLDevice ID impersonation [102], Access to sensitive data and Gain access, DoSCloning resistance and self-destruction, lowering information leakage (adding randomized delay, deliberately generated noise, balancing hamming weights, strengthening the cache architecture, shielding), integrating Physically Unclonable Function (PUF) in the device [102]
Social EngineeringALLControl sensors [103]Cloud-edge processing and feedback [104], Back up techniques, education of IoT users, tamper proofing and self-destruction
Malicious Node InjectionALLIllegal surveillance [102], Control data flow; Man in the MiddleData compression algorithm [105], Calculation of path credibility [106], Secure firmware update, hash-based mechanisms, Encryption, authentication technique
Sleep Deprivation AttackI, A, NPNode shutdownIntrusion Detection system [63], Firefly algorithm and Hopfield neural network [107], Radial bias function [108]
Malicious Code InjectionALLLoss of software integrity, Access to sensitive information and Gain access, DoSChain of trust, API endpoint security [102], Traffic monitoring and detection scheme [109], Tamper protection and self-destruction, IDS
RF InterferenceALLMessage block [91], DoSDistance-based information, Secure kill command for tags, Electronic Product Code (EPC) tags [63], spread-spectrum communication [110], Anti-jamming beamforming scheme [91]
Tag CloningALLUnauthorized copy of tagAttack probability scheme [111], Tag randomization [112], Encryption, hash-based methods, authentication framework, kill sleep instruction, isolation, blocking, distance estimation, Integrating PUFs into RFID tags
EavesdroppingC, NR, PExtract critical network information [102]Secure Bootstrapping [63], low-cost demilitarized zone [102], Encryption techniques, shift data to the back end
Tag TamperingALLMalicious altercation of data in tag memory [113]Authentication watermark and recovery Watermark [114], Integration of PUFs into RFID tags, hash-based mechanisms, encryption, tamper-release layer RFID, integrating alarm option for active Tags
Outage attackA, AC, P, AU, NPDisrupt or bias the state of applications [115]Random time hopping sequence and random permutation [115], Secure physical design
Object replicationALLControl network [116]3-D backward key chains based on deployment knowledge [117], Encryption, Hash-based methods, Lightweight cartographic schemes
Hardware TrojanALLFunction change of chips and sensitive information leakage [118]Temporal thermal information [118], Electromagnetic radiation [119], Side-channel signal assessment (based on path-delay fingerprint, based on symmetry breaking, based on thermal and power, machine learning application), trojan activation
Table 7. Encryption attacks with compromised security goals and countermeasures.
Table 7. Encryption attacks with compromised security goals and countermeasures.
Encryption AttacksCompromised Security RequirementsEffectsCountermeasures
Man In The Middle AttackC, I, P, NRExtract critical network information [102]Encryption of the RFID communication medium, authentication techniques [96]
Side-Channel AttacksC, AU, NR, PSecret key [84]Shielding [122], Adding randomized delay [123], Randomization [124], Blocking, isolation, sleep instruction, kill command, tamper proofing and self-destruction, lowering information leakage, obfuscating methods
Cryptanalysis AttacksALLEncryption KeyUltra-lightweight cryptography algorithm (SLIM) [125]
Table 8. Network attacks with compromised security goals and countermeasures.
Table 8. Network attacks with compromised security goals and countermeasures.
Network AttacksCompromised Security RequirementsEffectsCountermeasures
Traffic Analysis AttacksP, NRData leakage (Network information) [126]Anonymous Communication Scheme Based on the Proxy Source Node and the Shortest Path Routing [147], Traffic flow in different gateway [126]
RFID CloningALLGenuine tag removal and data collision [148]Firewalls, encryption of RFID signals, authentication to identify approved users, and shielding of RFID tags, PUF [96], Unreconcilable collision detection by multiple tags of same ID [148]
RFID SpoofingALLData Manipulation and Modification (Read, Write, Delete)RFID authentication protocol, Data encryption [96], Elliptic Curve Cryptography [149],
RFID Unauthorized AccessALLData manipulation [97], Data Modification (Read, Write, Delete)Authentication, Field detectors, Shift data to the backend [96], Arbitrator over the Universal Software Radio Peripheral (USRP) platform [150], Control circuit to notify and software [151]
Man In the Middle AttackC, I, P, NRData Privacy violation, source integrity [152]Encryption, Secure channel, Authentication protocol, Multidimensional plausibility check [132], Radio frequency fingerprint technology [153]
Denial of ServiceP, ANetwork Flooding, Network CrashOne-way hash chain [154], Policies provided by providers
Sinkhole AttackA, C, IRouting protocol [155], Data alteration or leakageWatchdog scheme, pathrater scheme [156], Geographic routing protocol [155], Radial bias function [108], Attribute-based access control and trust-based behavioral tracking [157], IDS solution, parent fail-over, identity certificates, and a rank authentication scheme
Routing Information AttacksI, NRRouting LoopsAuthentication, localized encryption and authentication protocol (LEAP) [156], Sink-based intrusion detection system [158]
Sybil AttackC, I, AC, NR, PMulti-path routing [156], Unfair resource allocation, RedundancyRadio resource testing and random key predistribution [156], Rule-based anomaly detection system [159], ID-based public keys [160], Attribute-based access control and trust-based behavioral tracking [157], Artificial bee colony (ABC) of honey bees [139], Classification-based Sybil detection (BCSD)
Replay AttackALLNetwork congestion, DoSKey agreement based on ECC, PUF, Hash etc [161], Gaussian-tag-embedded physical-layer authentication (GTEA) framework using a weighted fractional Fourier transform (WFRFT) [162], A challenge and response technique, the time-based or counter-based mechanism
HELLO flood attackC, I, AC, NR, P, AAdvertise fake route, Routing protocol [156], Resource consumption [163]Link-layer metric as a feature in the determination of the default path, limit size of connections [110], Amalgamation the merits of probability-based and location-based flooding algorithms [164], Deep learning [163]
Blackmail attackC, I, P, NRIsolation of legitimate device [143]Deep learning [165], Authentication mechanism
Blackhole attackC, I, AC, NR, PDrop packets [156]Multiple routing path [110], Attribute-based access management and trust-based behavioral tracking [157], Ad-hoc on-demand distance vector (AODV) with encryption [166], Proactive reputation updating algorithm and a reputation-based probabilistic forwarding strategy [167]
Wormhole attackC, I, AC, NR, PRouting protocol [155], Delete files and documents [84], Packet tunnelingpacket leash [156], Markle tree authentication, binding geographic information, Geographic routing protocol [155], Increment of alternative routing path and reduce timeout duration [144]
Grayhole attackC, I, AC, NR, PPacket drop [145]Multiple routing path [110], Acknowledgment count [168], Overhear the transmission of neighbor node for failure detection framework [169], Multihop communication [145]
Table 9. Application attacks with compromised security goals and countermeasures.
Table 9. Application attacks with compromised security goals and countermeasures.
Application AttacksCompromised Security RequirementsEffectsCountermeasures
Virus and WormsALLResource DestructionMachine learning techniques and signature matching techniques [186], Security updates, side-channel analysis, verify software integrity, control flow, protective Software
Malicious ScriptsALLInfected DataAlgebra statistics and geometric trends [187], Firewalls
Spyware and AdwareALLResource DestructionInstalling antivirus or antimalware; API call network with the heuristic detection mechanism [188], Logging and testing [173]
Trojan HorseALLResource DestructionNoise bound [189], Monitoring, Audit and research device and network, place IoT devices in separate segment or virtual LAN [190]
Denial of ServiceA, AC, AU, NR, PNetwork shutdown, Resource exhaustion [64]Access Control Lists
Firmware HijackingALLUnauthorized operation and path for other attacks [180]Electromagnetic pattern [191], use Safe programming languages, add runtime code, audit software
Botnet AttackALLService outage [181]Packet monitoring and feed to Enhanced Support Vector Neural Network (ESVNN) [192], Deep learning [193], Bot program in local DNS server [181]
Brute Force Password AttackALLSensitive data, System compromise [194]Logging attempt and frequency [195], Dynamic password change [196], Securing firmware update, cryptography methods
Phishing AttacksALLStage for multiple attack [197]Machine learning [197], Artificial intelligence [198], Cryptographic methods
Table 10. Comparative analysis of IoT security schemes.
Table 10. Comparative analysis of IoT security schemes.
AuthorYearObjectiveTechnique UsedType of DataFrameworkProsCons
Guo et al. [214]2017Solve complexity due to dynamic dataPKIBig dataBig data leftSingle sign-onID exposed, Fake certificate after changing RSU
Li et al. [215]2019Remove certificate storage dependencyPKIVehicle data-Certificate-lessvulnerable to resist attack
Kerrache et al. [218]2019To ensure trust among driversChaotic map and Social NetworkSocial profileTACASHIHonesty factorDependent on external factor
Meshram et al. [221]2021To secure smart cityChaotic mapSmart city-LightweightNeed to enhance security
Al et al. [219]2021Reduce communication and key management overheadCRSAThroughput gain-Minimizes collision and Improved throughputHigh storage, Keys of vehicles can be exposed
Hwang et al. [223]2020To enable safe channel for sharing medical dataCP-ABEMedical data-Safeguard issue of key abuseLeakage of PHI file
Han et al. [222]2021Algorithm to build frequent item setsCP-ABEAttributes-Improved speedLimited to same attribute set
Huang et al. [224]2019To safeguard against unauthorized entityECGPHR file-LightweightNeed to be anonymous
Hahn et al. [228]2019Countermeasure against MAC-based flawsMACHealth data-Less verification timeServer impersonation
Siddiqi et al. [227]2020To build feasible and secure IoMT communicationMACMedical dataIMDfenceLess energy consumptionNeed to ensure anonymity
Wazid et al. [229]2019Secure wireless communicationECCSurrounding informationAKM-IoVDynamic node additionDoes not resist DoS attack
Wu et al. [230]2020Reduce the verification delay and achieve fast message verificationECCBatch message-Batch verificationNeed focus on security
Thumbur et al. [231]2021Avoid complex certificate management problem and key escrow problemECCSignatureAggregate SignatureLow verification time and storage at RSUDoS attack
Zhang et al. [232]2020Secure communication with limited bandwidthECCSignature-Random number to avoid side-channel attackNeed RSU and TA secure communication
Ghahramani et al. [233]2020Support roaming users in global mobility networkECCMobile users data-Added deep learning to verify biometricHigh storage and communication cost
Xie et al. [235]2021To protect wireless sensor networks in smart cityECCWireless sensor-SimpleSmart card stolen attack
Xia et al. [237]2021To secure environment of smart gridECCSmart meter-Completed in two stepsSmart meter capture attack
Chen et al. [238]2021To get data from edge nodesECCEdge utility nodes-XOR and Hashed computationDid not consider the whole network
Srinivas et al. [239]2021Secure big data collection in smart transportationECCVehicle data-SecurityComputational, communication cost
Sharma et al. [243]2021Correctness of data exchangeSupervised machine learningLocation and movement-Detect attack and countermeasureLimited to position based attack
Pascale et al. [244]2021Detection of a possible cyber-attackMachine learningParameters as RPM-AccuracyNot focused on data transmission
Pradeep et al. [245]2022Secure smart city applicationsCHAP PPPOperational data of city-Simple calculationsSystem verification is absent
Wang et al. [246]2018Physical and external securityPUFVehicle dataNOTSAOBU with segregated applicationsNeed secure area in OBU
Yanambaka et al. [250]2019To develop secure IoMT systemPUFHealth dataPMSecSimple and lightweightML attack, MITM attack
Alladi et al. [247]2021Verification of ECU firmwarePUF and ECCFirmware and software-Physical safetyInsider can identify secret key
Aman et al. [248]2021Resist physical attacks and reduce overhead with secure communicationPUFNetwork traffic-Low authentication packets and overheadCRP updates can expose system
Alladi et al. [249]2021Sensitive information transfer and resist node capture/tampering attackPUFTraffic informationSecAuthUAVLow energy in device and low storage in serverCould server impersonation and ID expose
Badar et al. [251]2021Securing smart gridPUFLine flaw or breakage-Computational cost is lowCommunication cost is high
Tanveer et al. [252]2021To make reliable smart gridsPUF and ECCPower usagesARAP-SGComputational cost is lessUnnecessary storage and computation
Jiang et al. [254]2019Application of blockchain in IoVBlockchainBig data-Showed IoV using BlockchainSecurity will be in future work
Liu et al. [255]2019Reduce transaction confirmation delay and clod-start of new usersBlockchain (PoW)Traffic information-Pricing strategyNot suitable for high resource adversary
Yin et al. [256]2020Reduce processing time with gainig profitBlockchainMobile crowdsensing-Time-window based urgent taskReactive security
Yang et al. [257]2019Trust management in vehicular networkBlockchain (PoW and PoS)Traffic-Credible neighbor ratingReply attack, MITM attack etc, overhead
Gao et al. [258]2020Effective network managementBlockchainVehicular dataSDNAvoid frequent handover and relieve pressureNo focus on data transmission trust
Xu et al. [259]2021Energy efficiency and encounter external invasionBlockchainVehicular data-Suitable for high amount of databasic security
Javaid et al. [260]2020Trust establishmentBlockchain (dPoW) and PUFTraffic-No physical and side-channel attackCan expose response
Vivekanandan et al. [261]2021Secure device to device communication in smart cityBlockchain and ECCDevices dataBIDAPSCA5GLocation incorporationEavesdropping attack
Wang et al. [262]2022To build a reliable communication channel for healthcareBlockchain (PoW) and PUFHealth information-Low costStorage cost
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sadhu, P.K.; Yanambaka, V.P.; Abdelgawad, A. Internet of Things: Security and Solutions Survey. Sensors 2022, 22, 7433. https://doi.org/10.3390/s22197433

AMA Style

Sadhu PK, Yanambaka VP, Abdelgawad A. Internet of Things: Security and Solutions Survey. Sensors. 2022; 22(19):7433. https://doi.org/10.3390/s22197433

Chicago/Turabian Style

Sadhu, Pintu Kumar, Venkata P. Yanambaka, and Ahmed Abdelgawad. 2022. "Internet of Things: Security and Solutions Survey" Sensors 22, no. 19: 7433. https://doi.org/10.3390/s22197433

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop