IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v13y2021i16p9463-d619990.html
   My bibliography  Save this article

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

Author

Listed:
  • Ritika Raj Krishna

    (School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India)

  • Aanchal Priyadarshini

    (School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India)

  • Amitkumar V. Jha

    (School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India)

  • Bhargav Appasani

    (School of Electronics Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar 751024, India)

  • Avireni Srinivasulu

    (Department of Electronics and Communication Engineering, K. R. Mangalam University, Gurugram 122103, India)

  • Nicu Bizon

    (Faculty of Electronics, Communication and Computers, University of Pitesti, 110040 Pitesti, Romania
    Doctoral School, Polytechnic University of Bucharest, 313 Splaiul Independentei, 060042 Bucharest, Romania)

Abstract

The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.

Suggested Citation

  • Ritika Raj Krishna & Aanchal Priyadarshini & Amitkumar V. Jha & Bhargav Appasani & Avireni Srinivasulu & Nicu Bizon, 2021. "State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions," Sustainability, MDPI, vol. 13(16), pages 1-46, August.
  • Handle: RePEc:gam:jsusta:v:13:y:2021:i:16:p:9463-:d:619990
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/13/16/9463/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/13/16/9463/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Majid Ashouri & Fabian Lorig & Paul Davidsson & Romina Spalazzese, 2019. "Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics," Future Internet, MDPI, vol. 11(11), pages 1-12, November.
    2. Hyo-Sik Ham & Hwan-Hee Kim & Myung-Sup Kim & Mi-Jung Choi, 2014. "Linear SVM-Based Android Malware Detection for Reliable IoT Services," Journal of Applied Mathematics, Hindawi, vol. 2014, pages 1-10, September.
    3. Ahmed Abdulqader Hussein & Chee Yen Leow & Tharek A Rahman, 2017. "Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks," PLOS ONE, Public Library of Science, vol. 12(5), pages 1-43, May.
    4. Gioele Bigini & Valerio Freschi & Emanuele Lattanzi, 2020. "A Review on Blockchain for the Internet of Medical Things: Definitions, Challenges, Applications, and Vision," Future Internet, MDPI, vol. 12(12), pages 1-16, November.
    5. Maurizio Capra & Riccardo Peloso & Guido Masera & Massimo Ruo Roch & Maurizio Martina, 2019. "Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World," Future Internet, MDPI, vol. 11(4), pages 1-25, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Fatima Rafiq & Mazhar Javed Awan & Awais Yasin & Haitham Nobanee & Azlan Mohd Zain & Saeed Ali Bahaj, 2022. "Privacy Prevention of Big Data Applications: A Systematic Literature Review," SAGE Open, , vol. 12(2), pages 21582440221, May.
    2. Ayaskanta Mishra & Amitkumar V. Jha & Bhargav Appasani & Arun Kumar Ray & Deepak Kumar Gupta & Abu Nasar Ghazali, 2023. "Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 699-721, July.
    3. Bhargav Appasani & Sunil Kumar Mishra & Amitkumar V. Jha & Santosh Kumar Mishra & Florentina Magda Enescu & Ioan Sorin Sorlei & Fernando Georgel Bîrleanu & Noureddine Takorabet & Phatiphat Thounthong , 2022. "Blockchain-Enabled Smart Grid Applications: Architecture, Challenges, and Solutions," Sustainability, MDPI, vol. 14(14), pages 1-33, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Deveci, Muhammet & Gokasar, Ilgin & Pamucar, Dragan & Zaidan, Aws Alaa & Wen, Xin & Gupta, Brij B., 2023. "Evaluation of Cooperative Intelligent Transportation System scenarios for resilience in transportation using type-2 neutrosophic fuzzy VIKOR," Transportation Research Part A: Policy and Practice, Elsevier, vol. 172(C).
    2. Sharfah Ratibah Tuan Mat & Mohd Faizal Ab Razak & Mohd Nizam Mohmad Kahar & Juliza Mohamad Arif & Salwana Mohamad & Ahmad Firdaus, 2021. "Towards a systematic description of the field using bibliometric analysis: malware evolution," Scientometrics, Springer;Akadémiai Kiadó, vol. 126(3), pages 2013-2055, March.
    3. Sherif El-Gendy & Mahmoud Said Elsayed & Anca Jurcut & Marianne A. Azer, 2023. "Privacy Preservation Using Machine Learning in the Internet of Things," Mathematics, MDPI, vol. 11(16), pages 1-35, August.
    4. Abdallah Moubayed & Abdallah Shami & Anwer Al-Dulaimi, 2022. "On End-to-End Intelligent Automation of 6G Networks," Future Internet, MDPI, vol. 14(6), pages 1-28, May.
    5. Horst Treiblmaier, 2021. "Exploring the Next Wave of Blockchain and Distributed Ledger Technology: The Overlooked Potential of Scenario Analysis," Future Internet, MDPI, vol. 13(7), pages 1-13, July.
    6. Iqbal H. Sarker, 2023. "Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects," Annals of Data Science, Springer, vol. 10(6), pages 1473-1498, December.
    7. Khalid Mohiuddin & Huda Fatima & Mohiuddin Ali Khan & Mohammad Abdul Khaleel & Zeenat Begum & Sajid Ali Khan & Omer Bin Hussain, 2023. "Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials," SAGE Open, , vol. 13(3), pages 21582440231, August.
    8. Mohammed Talal & A. A. Zaidan & B. B. Zaidan & O. S. Albahri & M. A. Alsalem & A. S. Albahri & A. H. Alamoodi & M. L. M. Kiah & F. M. Jumaah & Mussab Alaa, 2019. "Comprehensive review and analysis of anti-malware apps for smartphones," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 72(2), pages 285-337, October.
    9. Dénes László Fekete & Attila Kiss, 2021. "A Survey of Ledger Technology-Based Databases," Future Internet, MDPI, vol. 13(8), pages 1-22, July.
    10. Spiridoula V. Margariti & Vassilios V. Dimakopoulos & Georgios Tsoumanis, 2020. "Modeling and Simulation Tools for Fog Computing—A Comprehensive Survey from a Cost Perspective," Future Internet, MDPI, vol. 12(5), pages 1-20, May.
    11. Shadab Alam & Surbhi Bhatia & Mohammed Shuaib & Mousa Mohammed Khubrani & Fayez Alfayez & Areej A. Malibari & Sadaf Ahmad, 2023. "An Overview of Blockchain and IoT Integration for Secure and Reliable Health Records Monitoring," Sustainability, MDPI, vol. 15(7), pages 1-20, March.
    12. Maurizio Capra & Beatrice Bussolino & Alberto Marchisio & Muhammad Shafique & Guido Masera & Maurizio Martina, 2020. "An Updated Survey of Efficient Hardware Architectures for Accelerating Deep Convolutional Neural Networks," Future Internet, MDPI, vol. 12(7), pages 1-22, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:13:y:2021:i:16:p:9463-:d:619990. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.