A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective

As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons....

Full description

Bibliographic Details
Main Authors: Hezam Akram Abdul-Ghani, Dimitri Konstantas
Format: Article
Language:English
Published: MDPI AG 2019-04-01
Series:Journal of Sensor and Actuator Networks
Subjects:
Online Access:https://www.mdpi.com/2224-2708/8/2/22
id doaj-cf9033f5a9ea43ab9291c987e4cb3d2f
record_format Article
spelling doaj-cf9033f5a9ea43ab9291c987e4cb3d2f2020-11-24T22:20:51ZengMDPI AGJournal of Sensor and Actuator Networks2224-27082019-04-01822210.3390/jsan8020022jsan8020022A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT PerspectiveHezam Akram Abdul-Ghani0Dimitri Konstantas1Geneva School of Economics and Management, Geneva University, 1211 Geneva, SwitzerlandGeneva School of Economics and Management, Geneva University, 1211 Geneva, SwitzerlandAs Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives.https://www.mdpi.com/2224-2708/8/2/22Internet of Thingssecurity guidelinesprivacy guidelinescountermeasuressecurity goalsattacks
collection DOAJ
language English
format Article
sources DOAJ
author Hezam Akram Abdul-Ghani
Dimitri Konstantas
spellingShingle Hezam Akram Abdul-Ghani
Dimitri Konstantas
A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
Journal of Sensor and Actuator Networks
Internet of Things
security guidelines
privacy guidelines
countermeasures
security goals
attacks
author_facet Hezam Akram Abdul-Ghani
Dimitri Konstantas
author_sort Hezam Akram Abdul-Ghani
title A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
title_short A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
title_full A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
title_fullStr A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
title_full_unstemmed A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
title_sort comprehensive study of security and privacy guidelines, threats, and countermeasures: an iot perspective
publisher MDPI AG
series Journal of Sensor and Actuator Networks
issn 2224-2708
publishDate 2019-04-01
description As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives.
topic Internet of Things
security guidelines
privacy guidelines
countermeasures
security goals
attacks
url https://www.mdpi.com/2224-2708/8/2/22
work_keys_str_mv AT hezamakramabdulghani acomprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective
AT dimitrikonstantas acomprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective
AT hezamakramabdulghani comprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective
AT dimitrikonstantas comprehensivestudyofsecurityandprivacyguidelinesthreatsandcountermeasuresaniotperspective
_version_ 1725773496752013312