메뉴 건너뛰기




Volumn 5, Issue 4, 2018, Pages 2483-2495

Evaluating critical security issues of the IoT world: Present and future challenges

Author keywords

Cyber threats; Internet of things (IoT); IoT protocols; IoT security; IoT system model; Trust

Indexed keywords

DATA PRIVACY; INTERNET PROTOCOLS; MALWARE; NETWORK PROTOCOLS; NETWORK SECURITY; SENSORS; TRUSTED COMPUTING; WIRELESS SENSOR NETWORKS;

EID: 85032723989     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2767291     Document Type: Article
Times cited : (643)

References (55)
  • 4
    • 85053192264 scopus 로고    scopus 로고
    • Accessed: Oct. [Online]
    • Inter-IoT Project. Accessed: Oct. 2017. [Online]. Available: http://www.inter-iot-project.eu/
    • (2017) Inter-IoT Project
  • 5
    • 85045689875 scopus 로고    scopus 로고
    • [Online]
    • Wikipedia Contributors. (2016). Dyn Cyberattack. [Online]. Available: https://en.wikipedia.org/w/index.php?title=2016-Dyn-cyberattack& oldid=763071700
    • (2016) Dyn Cyberattack
  • 7
    • 84910149653 scopus 로고    scopus 로고
    • Security of the internet of things: Perspectives and challenges
    • Nov
    • Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: Perspectives and challenges," Wireless Netw., vol. 20, no. 8, pp. 2481-2501, Nov. 2014.
    • (2014) Wireless Netw. , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 8
    • 84979493158 scopus 로고    scopus 로고
    • Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings
    • Jul.
    • K. Lin, M. Chen, J. Deng, M. M. Hassan, and G. Fortino, "Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings," IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1294-1307, Jul. 2016.
    • (2016) IEEE Trans. Autom. Sci. Eng. , vol.13 , Issue.3 , pp. 1294-1307
    • Lin, K.1    Chen, M.2    Deng, J.3    Hassan, M.M.4    Fortino, G.5
  • 9
    • 85010333007 scopus 로고    scopus 로고
    • Security issues in wireless networks: An overview
    • Sarajevo, Bosnia and Herzegovina
    • S. Baraković et al., "Security issues in wireless networks: An overview," in Proc. XI Int. Symp. Telecommun. (BIHTEL), Sarajevo, Bosnia and Herzegovina, 2016, pp. 1-6.
    • (2016) Proc. XI Int. Symp. Telecommun. (BIHTEL) , pp. 1-6
    • Baraković, S.1
  • 10
    • 85017187030 scopus 로고    scopus 로고
    • Using centrality measures to predict helpfulness-based reputation in trust networks
    • P. De Meo, K. Musial-Gabrys, D. Rosaci, G. M. L. Sarnè, and L. Aroyo, "Using centrality measures to predict helpfulness-based reputation in trust networks," ACM Trans. Internet Technol., vol. 17, no. 1, pp. 1-20, 2017.
    • (2017) ACM Trans. Internet Technol. , vol.17 , Issue.1 , pp. 1-20
    • De Meo, P.1    Musial-Gabrys, K.2    Rosaci, D.3    Sarnè, G.M.L.4    Aroyo, L.5
  • 11
    • 84949951775 scopus 로고    scopus 로고
    • Health information seeking in the web 2.0 age: Trust in social media, uncertainty reduction, and self-disclosure
    • Mar.
    • W.-Y. Lin, X. Zhang, H. Song, and K. Omori, "Health information seeking in the Web 2.0 age: Trust in social media, uncertainty reduction, and self-disclosure," Comput. Human Behav., vol. 56, pp. 289-294, Mar. 2016.
    • (2016) Comput. Human Behav. , vol.56 , pp. 289-294
    • Lin, W.-Y.1    Zhang, X.2    Song, H.3    Omori, K.4
  • 12
    • 84976443459 scopus 로고    scopus 로고
    • Trust estimation of the semantic web using semantic web clustering
    • H. Shirgahi, M. Mohsenzadeh, and H. H. S. Javadi, "Trust estimation of the semantic Web using semantic Web clustering," J. Exp. Theor. Artif. Intell., vol. 29, no. 3, pp. 537-556, 2017.
    • (2017) J. Exp. Theor. Artif. Intell. , vol.29 , Issue.3 , pp. 537-556
    • Shirgahi, H.1    Mohsenzadeh, M.2    Javadi, H.H.S.3
  • 13
    • 85053191341 scopus 로고    scopus 로고
    • Online shoppers' satisfaction: The impact of shopping values, website factors and trust
    • T. S. Vijay, S. Prashar, and C. Parsad, "Online shoppers' satisfaction: The impact of shopping values, website factors and trust," Int. J. Strategic Decis. Sci., vol. 8, no. 2, pp. 52-69, 2017.
    • (2017) Int. J. Strategic Decis. Sci. , vol.8 , Issue.2 , pp. 52-69
    • Vijay, T.S.1    Prashar, S.2    Parsad, C.3
  • 14
    • 85012295286 scopus 로고    scopus 로고
    • IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices
    • Jan./Feb.
    • S. Pinto, T. Gomes, J. Pereira, J. Cabral, and A. Tavares, "IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices," IEEE Internet Comput., vol. 21, no. 1, pp. 40-47, Jan./Feb. 2017.
    • (2017) IEEE Internet Comput. , vol.21 , Issue.1 , pp. 40-47
    • Pinto, S.1    Gomes, T.2    Pereira, J.3    Cabral, J.4    Tavares, A.5
  • 15
    • 84863512174 scopus 로고    scopus 로고
    • ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
    • Jul.
    • D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, "ReTrust: Attack-resistant and lightweight trust management for medical sensor networks," IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
    • (2012) IEEE Trans. Inf. Technol. Biomed. , vol.16 , Issue.4 , pp. 623-632
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.V.5
  • 16
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for internet of things
    • Jun.
    • Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," J. Netw. Comput. Appl., vol. 42, pp. 120-134, Jun. 2014.
    • (2014) J. Netw. Comput. Appl. , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 17
    • 84902106352 scopus 로고    scopus 로고
    • Trust management mechanism for internet of things
    • Feb.
    • G. Lize, W. Jingpei, and S. Bin, "Trust management mechanism for Internet of Things," China Commun., vol. 11, no. 2, pp. 148-156, Feb. 2014.
    • (2014) China Commun. , vol.11 , Issue.2 , pp. 148-156
    • Lize, G.1    Jingpei, W.2    Bin, S.3
  • 18
    • 85027017308 scopus 로고    scopus 로고
    • Trust-based service management for social internet of things systems
    • Nov./Dec.
    • I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for social Internet of Things systems," IEEE Trans. Depend. Secure Comput., vol. 13, no. 6, pp. 684-696, Nov./Dec. 2016.
    • (2016) IEEE Trans. Depend. Secure Comput. , vol.13 , Issue.6 , pp. 684-696
    • Chen, I.-R.1    Bao, F.2    Guo, J.3
  • 19
    • 84915766704 scopus 로고    scopus 로고
    • Building trust in the human-internet of things relationship
    • Nov
    • I. Kounelis et al., "Building trust in the human-Internet of Things relationship," IEEE Technol. Soc. Mag., vol. 33, no. 4, pp. 73-80, Nov. 2014.
    • (2014) IEEE Technol. Soc. Mag. , vol.33 , Issue.4 , pp. 73-80
    • Kounelis, I.1
  • 20
    • 84961752361 scopus 로고    scopus 로고
    • Privacy and security in internet of things and wearable devices
    • Apr./Jun.
    • O. Arias, J. Wurm, K. Hoang, and Y. Jin, "Privacy and security in Internet of Things and wearable devices," IEEE Trans. Multi-Scale Comput. Syst., vol. 1, no. 2, pp. 99-109, Apr./Jun. 2015.
    • (2015) IEEE Trans. Multi-Scale Comput. Syst. , vol.1 , Issue.2 , pp. 99-109
    • Arias, O.1    Wurm, J.2    Hoang, K.3    Jin, Y.4
  • 21
    • 84941085241 scopus 로고    scopus 로고
    • Internet of things: A survey on enabling technologies, protocols, and applications
    • 4th Quart
    • A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.4 , pp. 2347-2376
    • Al-Fuqaha, A.1    Guizani, M.2    Mohammadi, M.3    Aledhari, M.4    Ayyash, M.5
  • 22
    • 84923456856 scopus 로고    scopus 로고
    • Hierarchical data aggregation using compressive sensing (HDACS) in WSNs
    • X. Xu, R. Ansari, A. Khokhar, and A. V. Vasilakos, "Hierarchical data aggregation using compressive sensing (HDACS) in WSNs," ACM Trans. Sensor Netw., vol. 11, no. 3, 2015, Art. no. 45.
    • (2015) ACM Trans. Sensor Netw. , vol.11 , Issue.3
    • Xu, X.1    Ansari, R.2    Khokhar, A.3    Vasilakos, A.V.4
  • 23
    • 84959335910 scopus 로고    scopus 로고
    • When things matter: A survey on data-centric internet of things
    • Apr.
    • Y. Qin et al., "When things matter: A survey on data-centric Internet of Things," J. Netw. Comput. Appl., vol. 64, pp. 137-153, Apr. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.64 , pp. 137-153
    • Qin, Y.1
  • 24
    • 84991071444 scopus 로고    scopus 로고
    • Software-defined industrial internet of things in the context of industry 4.0
    • Oct.
    • J. Wan et al., "Software-defined industrial Internet of Things in the context of industry 4.0," IEEE Sensors J., vol. 16, no. 20, pp. 7373-7380, Oct. 2016.
    • (2016) IEEE Sensors J. , vol.16 , Issue.20 , pp. 7373-7380
    • Wan, J.1
  • 25
    • 85006074230 scopus 로고    scopus 로고
    • Enabling IoT interoperability through opportunistic smartphone-based mobile gateways
    • Mar.
    • G. Aloi et al., "Enabling IoT interoperability through opportunistic smartphone-based mobile gateways," J. Netw. Comput. Appl., vol. 81, pp. 74-84, Mar. 2017.
    • (2017) J. Netw. Comput. Appl. , vol.81 , pp. 74-84
    • Aloi, G.1
  • 27
    • 84977611874 scopus 로고    scopus 로고
    • A mobile multi-technology gateway to enable IoT interoperability
    • Berlin, Germany
    • G. Aloi et al., "A mobile multi-technology gateway to enable IoT interoperability," in Proc. IEEE 1st Int. Conf. Internet Things Design Implement. (IoTDI), Berlin, Germany, 2016, pp. 259-264.
    • (2016) Proc. IEEE 1st Int. Conf. Internet Things Design Implement. (IoTDI) , pp. 259-264
    • Aloi, G.1
  • 28
    • 84892614267 scopus 로고    scopus 로고
    • A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities
    • Dec.
    • Z. Sheng et al., "A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities," IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.6 , pp. 91-98
    • Sheng, Z.1
  • 29
    • 84979824607 scopus 로고    scopus 로고
    • A survey on wireless security: Technical challenges, recent advances, and future trends
    • Sep.
    • Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
    • (2016) Proc. IEEE , vol.104 , Issue.9 , pp. 1727-1765
    • Zou, Y.1    Zhu, J.2    Wang, X.3    Hanzo, L.4
  • 31
    • 84979784055 scopus 로고    scopus 로고
    • Assessing vulnerabilities in bluetooth low energy (BLE) wireless network based IoT systems
    • New York, NY, USA
    • Y. Qu and P. Chan, "Assessing vulnerabilities in Bluetooth low energy (BLE) wireless network based IoT systems," in Proc. IEEE 2nd Int. Conf. Big Data Security Cloud (BigDataSecurity), New York, NY, USA, 2016, pp. 42-48.
    • (2016) Proc. IEEE 2nd Int. Conf. Big Data Security Cloud (BigDataSecurity) , pp. 42-48
    • Qu, Y.1    Chan, P.2
  • 32
    • 84981262574 scopus 로고    scopus 로고
    • A comparative study of WLAN security protocols: WPA, WPA2
    • Dhaka, Bangladesh
    • A. H. Adnan et al., "A comparative study of WLAN security protocols: WPA, WPA2," in Proc. Int. Conf. Adv. Elect. Eng. (ICAEE), Dhaka, Bangladesh, 2015, pp. 165-169.
    • (2015) Proc. Int. Conf. Adv. Elect. Eng. (ICAEE) , pp. 165-169
    • Adnan, A.H.1
  • 33
    • 84925299747 scopus 로고    scopus 로고
    • Comparative study on 4G/LTE cryptographic algorithms based on different factors
    • Jul.
    • A. G. Sulaiman and I. F. Al Shaikhli, "Comparative study On 4G/LTE cryptographic algorithms based on different factors," Int. J. Comput. Sci. Telecommun., vol. 5, no. 7, pp. 7-10, Jul. 2014.
    • (2014) Int. J. Comput. Sci. Telecommun. , vol.5 , Issue.7 , pp. 7-10
    • Sulaiman, A.G.1    Al Shaikhli, I.F.2
  • 34
    • 85079333518 scopus 로고    scopus 로고
    • Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security
    • Y. E. Gelogo, R. D. Caytiles, and B. Park, "Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security," Int. J. Control Autom., vol. 4, no. 4, pp. 179-184, 2011.
    • (2011) Int. J. Control Autom. , vol.4 , Issue.4 , pp. 179-184
    • Gelogo, Y.E.1    Caytiles, R.D.2    Park, B.3
  • 35
    • 84908448624 scopus 로고    scopus 로고
    • Security protocols and privacy issues into 6LoWPAN stack: A synthesis
    • Oct.
    • C. Hennebert and J. D. Santos, "Security protocols and privacy issues into 6LoWPAN stack: A synthesis," IEEE Internet Things J., vol. 1, no. 5, pp. 384-398, Oct. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.5 , pp. 384-398
    • Hennebert, C.1    Santos, J.D.2
  • 36
    • 85053222434 scopus 로고    scopus 로고
    • (Dec.). [Online]
    • (Dec. 2014). Bluetooth Core Version 4.2. [Online]. Available: https://www.bluetooth.com/specifications/adopted-specifications
    • (2014) Bluetooth Core Version 4.2
  • 37
    • 85040194352 scopus 로고    scopus 로고
    • Accessed: Nov. [Online]
    • A Basic Introduction to BLE Security. Accessed: Nov. 2016. [Online]. Available: https://eewiki.net/display/Wireless/A+Basic+Introduction+ to+BLE+Security
    • (2016) A Basic Introduction to BLE Security
  • 39
    • 84964958468 scopus 로고    scopus 로고
    • Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, [Online]
    • "RPL: IPv6 routing protocol for low-power and lossy networks," Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6550
    • (2012) RPL: IPv6 Routing Protocol for Low-power and Lossy Networks
  • 40
    • 84938672829 scopus 로고    scopus 로고
    • Security for the internet of things: A survey of existing protocols and open research issues
    • 3rd Quart
    • J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues," IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 41
    • 84885328301 scopus 로고    scopus 로고
    • SVELTE: Real-time intrusion detection in the internet of things
    • Nov
    • S. Raza, L. Wallgren, and T. Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2661-2674, Nov. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 43
    • 84906994292 scopus 로고    scopus 로고
    • Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
    • Sydney, NSW, Australia
    • X. Wang, J. Zhang, E. M. Schooler, and M. Ion, "Performance evaluation of attribute-based encryption: Toward data privacy in the IoT," in Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, pp. 725-730.
    • (2014) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 725-730
    • Wang, X.1    Zhang, J.2    Schooler, E.M.3    Ion, M.4
  • 45
    • 84949626528 scopus 로고    scopus 로고
    • SecKit: A model-based security toolkit for the internet of things
    • Oct.
    • R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, "SecKit: A model-based security toolkit for the Internet of Things," Comput. Security, vol. 54, pp. 60-76, Oct. 2015.
    • (2015) Comput. Security , vol.54 , pp. 60-76
    • Neisse, R.1    Steri, G.2    Fovino, I.N.3    Baldini, G.4
  • 48
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: Lightweight secure CoAP for the internet of things
    • Oct.
    • S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure CoAP for the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3711-3720, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 50
    • 85053198839 scopus 로고    scopus 로고
    • Accessed: Mar. [Online]
    • CVSS. Accessed: Mar. 2017. [Online]. Available: https://en.wikipedia.org/wiki/CVSS
    • (2017) CVSS
  • 51
    • 85053206978 scopus 로고    scopus 로고
    • Accessed: Mar. [Online]
    • CVSSv2. Accessed: Mar. 2017. [Online]. Available: https://www.first.org/cvss/v2/guide
    • (2017) CVSSv2
  • 53
    • 85053221554 scopus 로고    scopus 로고
    • Accessed: Mar. [Online]
    • OWASP Project. Accessed: Mar. 2017. [Online]. Available: https://www.owasp.org/ index.php/OWASP-Internet-of-Things-Project
    • (2017) OWASP Project
  • 54
    • 85027987303 scopus 로고    scopus 로고
    • Accessed: Mar. [Online]
    • The Internet of Things (IoT): An Overview. Accessed: Mar. 2017. [Online]. Available: https://www.internetsociety.org/doc/iot-overview
    • (2017) The Internet of Things (IoT): An Overview
  • 55
    • 85053188396 scopus 로고    scopus 로고
    • Internet of things (IoT): Application systems and security vulnerabilities
    • Ras al-Khaimah, UAE
    • J. Ahamed and A. V. Rajan, "Internet of Things (IoT): Application systems and security vulnerabilities," in Proc. 5th Int. Conf. Electron. Devices Syst. Appl. (ICEDSA), Ras al-Khaimah, UAE, 2016, pp. 1-5.
    • (2016) Proc. 5th Int. Conf. Electron. Devices Syst. Appl. (ICEDSA) , pp. 1-5
    • Ahamed, J.1    Rajan, A.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.