A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons....
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-04-01
|
Series: | Journal of Sensor and Actuator Networks |
Subjects: | |
Online Access: | https://www.mdpi.com/2224-2708/8/2/22 |
id |
doaj-cf9033f5a9ea43ab9291c987e4cb3d2f |
---|---|
record_format |
Article |
spelling |
doaj-cf9033f5a9ea43ab9291c987e4cb3d2f2020-11-24T22:20:51ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082019-04-01822210.3390/jsan8020022jsan8020022A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT PerspectiveHezam Akram Abdul-Ghani0Dimitri Konstantas1Geneva School of Economics and Management, Geneva University, 1211 Geneva, SwitzerlandGeneva School of Economics and Management, Geneva University, 1211 Geneva, SwitzerlandAs Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives.https://www.mdpi.com/2224-2708/8/2/22Internet of Thingssecurity guidelinesprivacy guidelinescountermeasuressecurity goalsattacks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hezam Akram Abdul-Ghani Dimitri Konstantas |
spellingShingle |
Hezam Akram Abdul-Ghani Dimitri Konstantas A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective Journal of Sensor and Actuator Networks Internet of Things security guidelines privacy guidelines countermeasures security goals attacks |
author_facet |
Hezam Akram Abdul-Ghani Dimitri Konstantas |
author_sort |
Hezam Akram Abdul-Ghani |
title |
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective |
title_short |
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective |
title_full |
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective |
title_fullStr |
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective |
title_full_unstemmed |
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective |
title_sort |
comprehensive study of security and privacy guidelines, threats, and countermeasures: an iot perspective |
publisher |
MDPI AG |
series |
Journal of Sensor and Actuator Networks |
issn |
2224-2708 |
publishDate |
2019-04-01 |
description |
As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives. |
topic |
Internet of Things security guidelines privacy guidelines countermeasures security goals attacks |
url |
https://www.mdpi.com/2224-2708/8/2/22 |
work_keys_str_mv |
AT hezamakramabdulghani acomprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective AT dimitrikonstantas acomprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective AT hezamakramabdulghani comprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective AT dimitrikonstantas comprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective |
_version_ |
1725773496752013312 |