A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Received April 27, 2019, accepted June 10, 2019, date of publication June 20, 2019, date of current version July 10, 2019. | VIKAS HASSIJA1, VINAY CHAMOLA2, VIKAS SAXENA1, DIVYANSH JAIN1, PRANAV GOYAL1, AND BIPLAB SIKDAR3, (Senior Member, IEEE)
This paper provides a comprehensive survey of IoT security, focusing on application areas, security threats, and solution architectures. The authors highlight the critical need for high security in IoT applications, which are increasingly prevalent in various sectors such as smart cities, smart environments, smart metering, and smart agriculture. They discuss the unique security challenges faced by IoT, including data privacy, authentication, and management issues. The paper also reviews existing security solutions, emphasizing four major approaches: blockchain, fog computing, machine learning, and edge computing. Each approach is detailed, with specific examples and benefits highlighted. The authors conclude by identifying open issues and future research directions in IoT security, emphasizing the need for rigorous penetration testing and the integration of AI-based techniques to enhance IoT security.This paper provides a comprehensive survey of IoT security, focusing on application areas, security threats, and solution architectures. The authors highlight the critical need for high security in IoT applications, which are increasingly prevalent in various sectors such as smart cities, smart environments, smart metering, and smart agriculture. They discuss the unique security challenges faced by IoT, including data privacy, authentication, and management issues. The paper also reviews existing security solutions, emphasizing four major approaches: blockchain, fog computing, machine learning, and edge computing. Each approach is detailed, with specific examples and benefits highlighted. The authors conclude by identifying open issues and future research directions in IoT security, emphasizing the need for rigorous penetration testing and the integration of AI-based techniques to enhance IoT security.
Reach us at info@study.space