State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
Ritika Raj Krishna,
Aanchal Priyadarshini,
Amitkumar V. Jha,
Bhargav Appasani,
Avireni Srinivasulu and
Nicu Bizon
Additional contact information
Ritika Raj Krishna: School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India
Aanchal Priyadarshini: School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India
Amitkumar V. Jha: School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India
Bhargav Appasani: School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India
Avireni Srinivasulu: Department of Electronics and Communication Engineering, K. R. Mangalam University, Gurugram 122103, India
Nicu Bizon: Faculty of Electronics, Communication and Computers, University of Pitesti, 110040 Pitesti, Romania
Sustainability, 2021, vol. 13, issue 16, 1-46
Abstract:
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.
Keywords: Internet of Things; security; threats; privacy; vulnerabilities; Blockchain (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2021
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (3)
Downloads: (external link)
https://www.mdpi.com/2071-1050/13/16/9463/pdf (application/pdf)
https://www.mdpi.com/2071-1050/13/16/9463/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:13:y:2021:i:16:p:9463-:d:619990
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().