ArticlePDF Available

Challenges for Security in IoT, Emerging Solutions, and Research Directions

Authors:

Abstract and Figures

Internet of Things (IoT) systems have gained huge popularity in the past decade. This technology is developing as a back boon from the day-to-day utility in smart homes to intelligent power grids. It has become ubiquitous in the past decade while gaining popularity in academia and industry. As the devices used are usually sensors without a well-developed user interface, they are vulnerable to various threats. In this survey article, we have undergone some of the security challenges the technology faces and how the recently emerging technologies can provide an escape. Emerging technologies like blockchain, AI, and Deep learning techniques provide a platform where IoT operations are carried out successfully and securely. However, specific challenges need to be dealt with before implementing these in practice. We have briefly reviewed the role of particular technologies in securing IoT devices.
Content may be subject to copyright.
International Journal of Computing and Digital Systems
ISSN (2210-142X)
Int. J. Com. Dig. Sys. 12, No.1 (Oct-2022)
https://dx.doi.org/10.12785/ijcds/120198
Challenges for Security in IoT, Emerging Solutions, and
Research Directions
Iraq Ahmad Reshi1and Sahil Sholla1
1Department of Computer Science and Engineering, Islamic University of Science and Technology, Kashmir, JK, India
Received 22 Jan. 2021, Revised 15 Jul. 2022, Accepted 23 Jul. 2022, Published 1 Oct. 2022
Abstract: : Internet of Things (IoT) systems have gained huge popularity in the past decade. This technology is developing as a
back boon from the day-to-day utility in smart homes to intelligent power grids. It has become ubiquitous in the past decade while
gaining popularity in academia and industry. As the devices used are usually sensors without a well-developed user interface, they
are vulnerable to various threats. In this survey article, we have undergone some of the security challenges the technology faces
and how the recently emerging technologies can provide an escape. Emerging technologies like blockchain, AI, and Deep learning
techniques provide a platform where IoT operations are carried out successfully and securely. However, specific challenges need
to be dealt with before implementing these in practice. We have briefly reviewed the role of particular technologies in securing IoT devices.
Keywords: Fog Computing, Blockchain, Quantum Cryptography, Tiny Encryption, Machine Learning, Deep Learning
1. Introduction
By 2025, the total deployment of Internet of Things
(IoT) linked devices is predicted to reach 30.9 billion
elements, a significant increase from the 13.8 billion
devices that were expected by the end of 2021[1]. IoT
architecture include Sensing layer, which is the data
collection layer, the Network layer which undertakes the
communication part, and the application layer that enables
services and user interface. A typical IoT architecture
where data collected from sensors is transmitted to the
cloud via a gateway as shown in figure 1. The data can be
visualized at a user interface. The four-layer architecture
includes separation of application and services and the
five-layer architecture further adds a business layer over the
application layer. Though IoT has found a vast application
in several areas including Healthcare, Vehicular trac
management, smart homes, smart cities, and a lot more,
still it poses certain challenges that need to be addressed.
Since an IoT network is mainly composed of sensors
with limited device capabilities like battery and processing
so there is a lot of management and operational issues
other than traditional networks. A lot of IoT features
have included vulnerabilities. With the heterogeneous
nature of devices and by their interconnection a lot of
interfaces need to be integrated. Hence it becomes more
dicult to secure the system using one security protocol[2].
As IoT is the fusion of sensor networks with traditional
network systems, it brings extra security vulnerabilities with
its existence. Some researchers call it the Internet of Threats
due to its weak secure infrastructure [3]. With the number of
connected devices still on the rise, users feel insecure about
the privacy and security issues, due to the heterogeneity of
protocols and devices. In the past decade, several important
surveys have been written on the topic. Tables 1 and 2
discuss the contribution of multiple researchers. Moreover,
table 2 summarizes the contribution of proposed research
articles considering the technological solutions discussed.
The primary focus of our survey is to introduce the subjects
to the broader scope of cutting-edge technologies that are
enormously promising security solutions for IoT systems.
These technologies will revolutionize the context of IoT
networks in the near future. The rest of the paper is orga-
nized as follows. Section 2 briefs about various IoT security
challenges. Section 3 describes the emerging technology
solutions including Machine Learning (ML), Blockchain,
Tiny encryption, Quantum resistant approaches, and Fog
and edge computing. Section 4 briefs about the future
research motivation. In section 5, we conclude the survey.
2. Security Challenges
The lack of a proper interface in IoT devices adds to
their vulnerability. In past years we witnessed various large-
scale IoT attacks that changed the whole perspective of
security. Mirai malware generated data in terabytes by using
common factory default User-id and passwords. It took
down thousands of systems in 2016 and is still active [15].
Similarly, Stuxnet targets programmable logic controllers
(PLCs), initially destroyed plants in Iran, and is active still
and not domain-specific [16]. According to a CNN report
in 2017, implantable medical devices possess vulnerabilities
E-mail address: rshiraq333@gmail.com, sahilsholla@gmail.com http:// journals.uob.edu.bh
1232 Iraq Reshi, et al.: Challenges for Security in IoT, Emerging Solutions, and Research Directions
Figure 1. General architecture of an IoT network
that can be exploited. Such exploits can cost lives as the
implantable devices include pacemakers and defibrillators
that run the lives of hundreds of patients [17].In 2021
researchers discovered malware-based in an open-source
programming language of google called BotenaGo [18].It
has the ability to infect thousands of gateways and IoT de-
vices. BotenaGo was identified by ATT AlienLabs engineers
and can target over 30 distinct vulnerabilities.
IBM security intelligence reported a few years ago, a
jeep was hacked and it was discovered that hackers could
make it speed up or down that could cost human lives [19].
The various security concerns that need to be taken care of
in an IoT system are mentioned below.
A. Scalability
The scalability issue arises due to the number of IoT de-
vices constantly increasing. Making such a massive number
of devices communicate is a big challenge. To connect con-
siderable number of devices, traditional routing protocols
are not suitable. Also, there is a need for data processing and
management systems that can handle such significant data
amounts. Due to a large number of nodes in IoT networks,
a security mechanism designed for such a system should be
scalable.
B. Centralization
As IoT devices cannot themselves handle the data and
the related processing, a need for centralized architecture
to process the data for the application layer is mandatory.
The communication in an IoT network is so intense that
these centralized systems may crash and render the net-
work useless. A central server is also the target for most
of the attacks. Centralized systems are prone to central
system attacks from Citi-bank 1995 to Wana-cry 2017,
and attackers plundered billions of dollars by targeting the
vulnerabilities in centralized systems. IoT networks, due to
the absence of sophisticated hardware at the end-user level,
are more reliant on centralized servers for processing and
communication. This factor increases the probability of Dos
and DDoS attacks on IoT networks. Security solutions need
to be devised such that the reliance on a central server is
minimized and the probability of such attacks is minimized.
C. Data Privacy
Technological advancements in IoT have made us quite
dependable on smart devices. The large-scale use of smart
bands, Fitbit sensors, smart toys, and a lot more has
complicated online data storage in terms of its privacy
feature. The private data gets shared with unknown parties,
and it may prove fatal in certain cases. Privacy feature has
an immense requirement in IoT systems, especially when
dealing with sensitive data like medical or smart homes.
Radio Frequency utilization (RFID) and other tagging ap-
proaches used in IoT networks can largely reveal confi-
dential information about the individual. The occurrence of
eavesdropping and trac analysis attacks in IoT networks
is common due to their wireless nature, so approaches are
http:// journals.uob.edu.bh
Int. J. Com. Dig. Sys. 12, No.1, 1231-1241 (Oct-2022) 1233
TABLE I. Key contribution of surveys published from 2014 to 2022
Reference Year Contribution
[4] 2014 Survey highlights the information security background in IoT systems, and various security
challenges.
[5] 2015 A review of 100 symmetric ciphers including modern block, involution and lightweight ciphers
utilized in resource constrained environments.
[6] 2016 Survey on challenges faced in common IoT implementations with solutions applicable at layer
level.
[7] 2017 Taxonomy of current IoT security vulnerabilities in context of application, architecture and
communication.
[8] 2018 Research trends in IoT from 2016 to 2018, with modellers, simulators and computational and
analysis platforms.
[9] 2018 Survey on role of blockchain based mechanisms in securing IoT systems.
[10] 2019 Security related challenges in IoT and survey of technologies focussing on higher levels of
integrity in IoT applications.
[11] 2020 A survey on State of art deep learning and big data technologies based solutions for plugging
IoT vulnerabilities.
[12]] 2021 Discussion on Post Quantum cryptographic solutions for IoT systems with special mention of
Lattice based cryptography.
[13] 2022 Complete quality analysis on authentication and session keys, in IoT systems and utilization of
ML and blockchain in IoT systems for security purposes.
[14] 2022 A survey on symmetric and asymmetric light weight encryption algorithms for IoT systems.
This Survey 2022 A survey on cutting edge emerging technology security solutions for IoT systems.
required to tackle the dierent attacks leading to privacy
breaches.
D. Protocol Interoperability
One more factor that adds to the constraints is the nature
of IoT devices. Since they are heterogeneous, it implies a
requirement of an infrastructure that takes into consideration
the various types of devices and dierent natures. Also,
an ecient routing scheme is needed to carry out the
communication from the physical to the application layer.
The interoperability feature of IoT networks should not
hinder the security parameters, and similarly, the security
mechanism applied should not limit the interoperability of
the systems.
E. Data management
In IoT systems, data from multiple sources is collected
and is subjected to multiple operations like prediction and
mining. Due to the extremely large number of IoT devices,
a huge amount of data is generated, and managing such a
huge amount of data that is unstructured is a cumbersome
task. Data management challenges in IoT systems include
integrating the data taken from dierent sources, automation
and distribution of the data collection process, and real-
time analysis of the collected data. Mismanagement of IoT
data gives rise to various security issues like confidentiality
breaches. The confidential data in IoT networks needs to be
protected using cryptographic primitives.
3. Promising Solution Approaches
Promising countermeasures for IoT security issues have
been included in this paper.
A. Edge and Fog Computing
The cloud, IoT end devices, the edge, and users are
all significant players in the edge-centric IoT architecture.
Technology adopters employ sophisticated IoT apps to
make their jobs easier, and instead of directly engaging with
IoT end devices, they connect with them through the cloud
or edge-based interactive interfaces [20].
Because of the inherent limitations of IoT technology, such
as insucient storage and processing capacity, a strong
foundation is required to handle data eciently. Fog com-
puting is a technique that was proposed for bridging the
gap between remote data centers and Internet of Things
devices. Fog is an ideal framework for IoT services in
a variety of applications, including linked cars and smart
grids [21]. In [20] authors proposed EdgeSec, a concept
for an innovative security service that is incorporated at
the edge layer to improve IoT system security. EdgeSec
is made up of several primary components that collab-
orate to address particular security concerns in IoT in-
frastructure methodically with eectiveness illustrated in
the Smart home scenario. SIOTOME [22], another coop-
erative framework in between the access point and the
Internet Service Provider (ISP) to provide real-time cyber
security for detecting and isolating IoT security breaches.
It is an architecture for a cohesive, privacy-preserving
analytics architecture between the network edge and an
ISP. Researchers developed a new programmable security
architecture based on edge computing that uses a security
agent as an approaching edge device to provide security
services as IoT resources for the security requirements of
all protocol stacks, including dierent applications [23].
http:// journals.uob.edu.bh
1234 Iraq Reshi, et al.: Challenges for Security in IoT, Emerging Solutions, and Research Directions
TABLE II. Solution approaches analyzed in previous surveys for security in IoT
Reference Title Fog/Edge Blockchain ML/DL Quantum
Cryptog-
raphy
Tiny Encryption
[4] IoT Security: Ongoing Challenges
and Research Opportunities.
- - - -
[5] A comprehensive survey of modern
symmetric cryptographic solutions
for resource constrained. environ-
ments
- - - -
[6] A Review of Security Concerns in
Internet of Things.
- - - - -
[7] Internet of Things security: A sur-
vey.
- - -
[8] Current research on Internet of
Things (IoT) security: A survey.
- - -
[9] Blockchain mechanisms for IoT se-
curity.
- - - -
[10] A Survey on IoT Security: Appli-
cation Areas, Security Threats, and
Solution Architectures.
- -
[11] Deep learning and big data tech-
nologies for IoT security.
- - - -
[12] Post-Quantum Cryptosystems for
Internet-of-Things: A Survey on
Lattice-Based Algorithms.
- - - -
[13] Cyber-physical security for IoT
networks: a comprehensive re-
view on traditional, blockchain and
artificial intelligence based key-
security.
- - -
[14] Lightweight cryptography in IoT
networks: A survey.
- - - -
This Survey Emerging Security Challenges and
Promising Solution Approaches in
IoT.
This framework is intended to address issues such as high
computing costs, limited key management versatility, and
incompatibility when implementing new security algorithms
in IoT, particularly when using complex encryption algo-
rithms. A new framework to tackle the security of edge
computing by virtualizing the edge nodes, which reduces
the risks associated with data transfer[24]. Combining edge
computing with virtual networks, as well as using network
virtualization technologies to address the issues that edge
are the future research areas in this topic. When dealing
with highly sensitive data, such as in business or research,
IoT devices are vulnerable to a variety of risks, which might
result in data loss. Additional security can be obtained by
performing additional computations on encrypted files as
proposed in [25]. Homomorphic encryption is an encryption
approach that permits calculations on encrypted data with-
out decryption, avoiding the need to reveal the plaintext
to intermediaries (servers). In [26], authors propose an
Elliptic Curve Die–Hellman Ephemeral (ECDHE) with
Pre-Shared Key (PSK). This integration was proposed as
a lightweight authentication scheme based on the MQTT
protocol. The suggested ECDHE-PSK technique is about
as lightweight as the PSK method while having security
features of certificate-based algorithms, according to the
rigorous performance and security assessments. A service
is created in which data and inferences from the edge are
integrated with cloud insights to create a coherent system
for early detection of security concerns and autonomous
action, as well as alerting the user and ISP.
B. Blockchain
A blockchain is a distributed ledger that records all
completed transactions and data in chronological sequence
in a collection of tamper-proof memory space. These trans-
actions are then shared among all individuals that have
signed up. Every user or node in the system preserves the
http:// journals.uob.edu.bh
Int. J. Com. Dig. Sys. 12, No.1, 1231-1241 (Oct-2022) 1235
very same ledger as other users or nodes in the network,
information is kept and/or publicized as a shared ledger
that is hard to alter [9]. The stability of the network is
maintained by a mechanism called consensus, where nodes
agree on certain conditions. There are several consensus
mechanisms, dierent blockchain networks follow. In this
regard, to converge IoT and blockchain technologies and
how the latter comes as a savior for the former a deep
study of the topic is intended. Blockchain-based IoT in-
frastructure is diagrammatically represented in figure 2.
A survey on integration of blockchain with IoT, as well
as the weaknesses of centralised designs like IoT and
how role of blockchain in mitigating them is presented
in [27]. Blockchain technologies when collaborated with
IoT have a lot of technical issues like scalability, privacy,
and various integration interfacing issues. Authors in [28]
proposed sliding window blockchain architecture, for IoT
as only a portion of the chain, is maintained in the device’s
memory instead of full node strength (n). By this, the
memory constraints of IoT devices and scalability issues of
blockchain are nullified. Litichain architecture is proposed
based on End of graph (EOG) structure-based ordering of
end time of blocks [29]. A block is removed from the
chain after its lifetime expires, so in this way, it solves
the memory constraint of IoT devices too. In [30], authors
suggested a mechanism to control access to vital sensor
and actuator data, via a private and lightweight blockchain.
Real-time encryption techniques are performed on a min-
imal ARM Cortex-M4 microcontroller, and a massively
scalable and energy-ecient consensus mechanism proof
of authentication (POAH) is implemented on blockchain
to improve the proposed architecture’s computing perfor-
mance. In [31] , authors provide a detailed summary of how
to adapt blockchain to specific IoT requirements to create
blockchain-based IoT (BIoT) applications, intending current
state-of-the-art eort in this area. Despite the limitations and
open security vulnerabilities that blockchain may impose
on present IoT systems, In [32], authors explored IoT
security and privacy issues and how blockchain might be
used to solve these issues. Moreover, this paper summarizes
the results of blockchain and IoT upon integration with
machine learning as the integration promises enhanced
security mechanisms. Moreover, researchers outlined the
fundamental issues that IoT systems face, as well as
blockchain’s potential role in addressing them. The novelty
of introducing dew and cloudlet technologies enhances the
throughput by reducing end-to-end delay as the computing
is done closer to IoT devices in this approach[33].
C. Machine And Deep Learning
Implementing security protocols for IoT devices such as
encryption, authentication, identity management, network,
and information protection, is inecient[4]. As a result,
existing security approaches need to be improved to safe-
guard the IoT ecosystem properly. Machine learning and
deep learning (ML/DL) have come a long way in recent
years, and machine intelligence has gone from being a
laboratory curiosity to being used in a variety of essential
applications [34]. Figure 3 represents the integration of ML
or DL approaches with IoT infrastructure. The deep and
Machine Learning-based approach has a great advantage
over traditional security systems while tackling Zero-day
attacks. As the algorithms based on Deep Learning are
powerful analyzing tools for learning normal or abnormal
behavior. Collecting input data from the IoT devices and
analyzing the communicating pattern, enable us to identify
malicious behavior at an early stage [35]. The authors
in [36] introduced a new machine learning (ML)-based
security architecture that can automatically deal with the
growing security concerns in the IoT area utilizing the
data mining methods. This reviewed experiment for the
anomaly-based intrusion detection system (IDS) for IoT in
a real Smart building scenario is proven to be extremely
successful. In [37] authors described a wireless device
recognition platform that uses deep learning approaches to
improve Internet of things (IoT) security.
Deep learning is a potential way for learning the prop-
erties of various radio frequency (RF) devices based on
their RF data. To recognize digital devices and dieren-
tiate among devices from the same manufacturer, three
deep learning models considered are Deep Neural Network
(DNN), Convolutional Neural Network (CNN), and Recur-
rent Neural Network (RNN). As a physical layer authentica-
tion system, RF fingerprinting might be used to dierentiate
genuine wireless devices from malicious ones. Moreover,
Deep Learning methods can predict unknown attacks that
are mutants of the known or previous ones. As they learn
and train from the previous examples and predict the future
[34] . Researchers in [38] proposed an IDS which employs
ML to detect cyber-attacks and inhomogeneities in IoT net-
works with limited resources. CICIDS2017 and NSL-KDD
datasets were subjected to extensive testing and training and
the results showed the model can spot malicious activity
with considerably fewer training examples and training
time. Another such approach was proposed in [39] that
proposes a Deep Learning-based anomaly detection system
for IoT networks. This model is also safe from illegal
authentication and malicious activities. Recently advance-
ments in Federated Learning also show a lot of promise
in countering IoT security issues, especially privacy. In
this mode of learning, the modules can be trained and
the learning process can be distributed across the dierent
nodes. A study in[40] proposes a federated learning method
that combines an adaptable gradient descent approach with
a dierential privacy technique for multi-party participatory
modeling contexts. Under fixed communication costs, the
suggested dynamic federated learning approach outperforms
standard methods, according to experimental results.
D. Quantum Cryptography
Due to the inevitable advent of scalable quantum sys-
tems, substantial research in Post Quantum Cryptography
(PQC) has sprung up. Embedded IoT (edge) devices have
a greater diculty due to their widespread use in today’s
http:// journals.uob.edu.bh
1236 Iraq Reshi, et al.: Challenges for Security in IoT, Emerging Solutions, and Research Directions
Figure 2. Blockchain-based IoT system
Figure 3. Machine and Deep Learning integration with IoT system
society and their more stringent resource. Lattice-based
Encryption (LBE) is emerging as one of the most feasible
quantum-resistant cryptography schemes about half of the
survivors of the second round of the NIST’s PQC challenge
are lattice-based in structure [41].
In [42], a hybrid IoT security framework with an additional
layer that assures quantum state is proposed. By preserving
its state and securing the key with quantum cryptography
BB84 protocol, this state prohibits eavesdroppers from
doing damaging operations in the transmission medium and
cyberspace. The hybrid management employs a traditional
cryptographic mechanism known as One-Time Pad (OTP).
The article [43] provides an overview of what is known as
post-quantum IoT systems (IoT systems that are immune to
presently available quantum attacks. Post quantum security
with special reference to IoT systems is discussed. In [44]
researchers proposed IoT combining quantum key distribu-
tion (QKD) and the RC6 encryption algorithm, where QKD
is the scientific method of exploiting the subatomic particles
eect to execute security tasks and produce a secret key.
QKD is a quantum key distribution system that uses photons
to produce a key and sends data across a quantum channel,
also known as a fiber optic channel or optical free space.
Utilized BB84 protocol by Bennett and Brassard (1984).
The BB84 methodology creates a keystream between two
people based on the polarization of the photon to capture
the state of the particle, which is known as a qubit (in
quantum theory, a qubit can be both 0 and 1 at the very same
time) and then converts it to a regular bit predicated on the
photon polarization. In another approach proposed in [45]
http:// journals.uob.edu.bh
Int. J. Com. Dig. Sys. 12, No.1, 1231-1241 (Oct-2022) 1237
called new bilateral generalization inhomogeneous short
integer solution (Bi-GISIS). This solution is implemented
with the re-useable key feature. Because recyclable keys
are ensured, a similar key can be used in multiple iterations
of the suggested technique. This capability lets resource-
constrained IoT designs make ecient use of reusable keys.
PQ-FLAT [46] is a lightweight cryptographic protocol for
enhancing the security of IoT devices. It is based on the
unified lightweight identification of artifacts,that performs
well in IoT networks for resource-constrained gadgets. A
lattice-based encrypted communication technique is em-
ployed rather than the asymmetrical cryptosystem, which
is reliable throughout the post-quantum world.
E. Tiny Encryption
Due to sluggish nature of traditional cryptographic
methods, lightweight cryptography centered on Tiny
Encryption Algorithms (TEA) is required to improve
performance benefits from a software perspective instead
of hardware implementation for IoT devices. These
techniques shorten the time it takes to encrypt data in
the IoT platform while maintaining the security-eciency
trade-o[47]. The algorithms for an IoT-driven setup
should be more safe and ecient, as well as more suited
to data security [19]. But TEA suers from several issues
like equivalent and related key attacks [48].
Lowering the encryption round in PRESENT cipher
resulted in a lightweight PRESENT cipher by changing
the Key Register updating mechanism, and adding an
extra layer between the S-box layer and the P-layer of
the existing cryptographic method. The additional layer
allows us to lower the PRESENT round from 31 to
25, which is the bare minimum necessary for security.
Encrypting the key register improves the performance of
the proposed technique [49]. Authors in [50] sought to
improve the security of smart home devices by creating
a new TEA. Through entropy shifting, expanding, and
mixing techniques, TEA’s weaknesses of related-key attacks
and the vulnerability of predictable keys were removed,
allowing it to be used in protecting smart devices. With the
same keys, the updated TEA generates dierent ciphertext.
The modified TEA was shown to be more secure than the
original TEA in testing. Another study provides a Dynamic
Light-weight Symmetric (DLS) encryption method that was
conceived and built to handle data security and real-time
reliable data transfer via message advertising [51]. The
algorithm encrypts each sending packet using a basic XOR
operator using a unique periodic encryption method. DLS
can dramatically improve security over existing baseline
cryptographic algorithms with only a minimal increase
in computer requirements. Recently Nayak et al., [52]
proposed a lightweight algorithm for encrypting IoT data
called Enhanced Secure IoT (ESIT). It is a block cipher-
based approach that utilizes a 64-bit key. By deleting the
string of q-bits from each lateral side, it is the typical
bitwise left and right shift. The experimental analysis
clearly shows the advantages of the proposed approach. In
[53] Islam et al., the authors proposed an approach that
ensures a smooth lightweight security approach that relies
on Elliptic Curve Cryptography is described to secure
interaction between IoT devices. It defends typical malware
and oers total protection against security concerns such
as identification, privacy, stability, and key exchange.
Experimental evaluation shows that the suggested method
outperforms state-of-the-art cryptographic algorithms.
F. Other Techniques
Apart from mentioned emerging technologies, there are
other approaches that can be utilized for securing IoT
infrastructures. Software defined networking (SDN) is one
such platform that introduces SDN controller that manages
the whole network. SDN, from a security standpoint, does
have capacity to collect data from connected devices and
enable programs to control forwarding devices, unleashing
a powerful tool for adaptive and intelligent security policies
[54]. The key focus of researchers for secure IoT architec-
tures have been towards software based solutions, however,
hardware based solutions have started to gain popularity in
recent times. In [55], a physical unclonable function (PUF)
is a hardware-based cryptographic primitive is proposed,
that can track and identify an integrated circuit (IC). SDNs
and Hardware based security solutions for IoT, though not
fully explored, but are suitable candidates for securing IoT
devices.
4. Discussion
IoT security is one of the key concerns that need to be
catered to. In our article, we have reviewed some emerging
technologies that promise a great deal in countering the
dierent security issues. Fog computing reduces the burden
of processing on both users as well as service levels. It
provides a medium where multiple encryption algorithms
can be utilized for IoT systems. Algorithms like ECDHE,
multiple variants of Homomorphic encryption, and RSA can
be integrated with IoT networks using the services of Fog
and Edge layer. To counter centralized architecture failures,
blockchain-based IoT systems promise decentralization,
tamper resistance, and immutability. However, blockchain
technology is still in its early stages of development.
Hence, technical expertise is the requirement of the subject.
Blockchain-based IoT systems have gained huge popularity
due to various applications like food traceability and med-
ical supply chain. Moreover, for such systems, scalability
and privacy are the areas that need to be focused on in B-
IoT systems. Utilization of possible scalable measures like
sliding window protocol, EOG in litichain, and cloudlet
technologies promise scalable and secure B-IoT systems.
To tackle the attacks, devices trained with datasets of some
commonly known attacks, hence can be detected in advance.
In recent years there has been enormous growth in the
development of IDS, that have reduced the probability of
security attacks. Moreover, the development of federated
learning promises sophisticated and secure IoT systems as
training and learning can be utilized in a distributed manner.
In this era of quantum computing, providing security to
http:// journals.uob.edu.bh
1238 Iraq Reshi, et al.: Challenges for Security in IoT, Emerging Solutions, and Research Directions
TABLE III. Emerging security solutions in IoT using various domains
Group/Category Reference Contribution
Edge and Fog
Computing
[21] Proposed Fog based security solutions for smart grids and VANETS.
[20] Innovative security service Edge-Sec at edge layer.
[22] Proposed SIOTOME, a cooperative framework for real-time security.
[23] Programmable lightweight security architecture on edge computing.
[24] Proposed security framework based on network virtualization.
[25] Privacy preservation algorithms on Fog nodes using Homomorphic encryption.
[26] Data security utilizing Elliptic Curve Die–Hellman for IoT devices at Fog .
Blockchain [27] Possible mitigation strategies for IoT vulnerabilities by blockchain.
[28] Sliding window blockchain for securing IoT devices and blockchain scalability.
[29] Litichain, a scalable blockchain for securing IoT at Edge.
[30] Lightweight blockchain architecture with real-time encryption techniques.
[31] State of art of various blockchain-based security solutions for IoT.
[32] Summarizes the role of blockchain and ML in plugging IoT vulnerabilities.
[33] Proposes cloudlet technology in IoT and suggests the potential role of blockchain.
ML and DL [34] Prediction of unknown and mutant attacks using Deep Learning.
[35] Anomaly-based IDS deployed in real smart building scenarios.
[37] A wireless device recognition platform based on a deep learning approach.
[38] ML and DL-based systems that detect inhomogeneities in IoT networks.
[39] Deep learning-based IDS for malicious activities on IoT platforms.
[40] Federated approach combined with adaptable gradient descent.
Quantum
Cryptography
[42] Hybrid framework with quantum cryptography BB84 protocol.
[43] A broad overview of post-quantum IoT attacks and proposed solutions.
[44] Proposed quantum key (QDK) with RC6 that generates keys using photons.
[45] Bi-GISIS, a protocol using re-usable keys in multiple iterations.
[46] PQ-FLAT, Lattice-based cryptographic protocol for the post-quantum world.
Tiny
Encryption
[47] Enhanced TEA by rotating sub-keys in every round.
[49] Alteration to an original PRESENT cipher by lowering an encryption round.
[50] Proposed ETHASH, an enhanced version of original TEA.
[51] Dynamic Lightweight Symmetric encryption with XOR operator.
[52] Block cipher-based approach utilizing bitwise functions.
[53] IoT network with Enhanced security utilizing lightweight ECC.
a system is pretty dicult as it takes minutes to break a
cipher which would otherwise require years. Development
of Quantum resistant cryptographic techniques, especially
LBE, BB84 protocol, and PQ-FLAT, are promising security
solutions, especially for IoT-based systems. Another suit-
able technique for enhancing the security of IoT systems
is TEA. DLS, modifications to PRESENT cipher, and
proposed lightweight ECG solutions are some of the key
solutions that have been discussed in the literature.
5. Future Research Direction
The previous discussion makes clear the critical role of
mentioned technologies in securing IoT systems. Although
we can move most operational procedures from IoT end-
points to the edge layer, many IoT systems still require a
high level of data security for the communication channels
that connect terminals to the edge. Blockchain integration
in IoT needs more attention as there are multiple challenges
of scalability and convergence. For Machine Learning based
solutions, proper handling of training data sets is required.
For utilizing ML in securing IoT data, more hybrid learning
strategies and novel visualization techniques will suce
the need. However, the development of new AI approaches
like Federated learning promises a great deal in enhancing
the security of IoT devices. Federated approaches can
collaborate with Fog computing to distribute the learning
process and reduce the burden on centralized systems. The
evolution of quantum computing is fast, so before devising
any mechanism, even after proper analysis, we are unsure
about its success. Also, Quantum computing algorithms
require an enhanced skill set and resources at hand to
implement in real-world scenarios. To implement TEAs
in IoT systems, several challenges need to be addressed,
and the algorithms need a slight modification for better
adaptation In IoT systems.
6. Conclusion
IoT systems have gained rapid popularity over the past
decade. However, these systems come up with a security
challenge as they lack the proper infrastructure. The growth
of emerging technologies like blockchain, Edge computing,
Machine Learning, TEAs, and Quantum cryptography are
promising solutions to these security challenges. There is
still a need for optimization before converging any of these
http:// journals.uob.edu.bh
Int. J. Com. Dig. Sys. 12, No.1, 1231-1241 (Oct-2022) 1239
technologies with IoT systems..
References
[1] J. Markarian, “Teris, Feb 2022.
[Online]. Available: https://teris.com/
interesting-2022- iot-statistics- and-how-it-applies-to-e-discovery/
[2] S. A. Al-Qaseemi, H. A. Almulhim, M. F. Almulhim, and S. R.
Chaudhry, “Iot architecture challenges and issues: Lack of stan-
dardization,” in 2016 Future technologies conference (FTC). IEEE,
2016, pp. 731–738.
[3] F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella,
“Iot: Internet of threats? a survey of practical security vulnerabilities
in real iot devices,” IEEE Internet of Things Journal, vol. 6, no. 5,
pp. 8182–8201, 2019.
[4] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen,
and S. Shieh, “Iot security: ongoing challenges and research op-
portunities,” in 2014 IEEE 7th international conference on service-
oriented computing and applications. IEEE, 2014, pp. 230–234.
[5] J. H. Kong, L.-M. Ang, and K. P. Seng, “A comprehensive survey of
modern symmetric cryptographic solutions for resource constrained
environments, Journal of Network and Computer Applications,
vol. 49, pp. 15–50, 2015.
[6] E. Leloglu, “A review of security concerns in internet of things,”
Journal of Computer and Communications, vol. 5, no. 1, pp. 121–
136, 2016.
[7] F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet
of things security: A survey, Journal of Network and Computer
Applications, vol. 88, pp. 10–28, 2017.
[8] W. H. Hassan et al., “Current research on internet of things (iot)
security: A survey,” Computer networks, vol. 148, pp. 283–294,
2019.
[9] D. Minoli and B. Occhiogrosso, “Blockchain mechanisms for iot
security, Internet of Things, vol. 1, pp. 1–13, 2018.
[10] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar,
“A survey on iot security: application areas, security threats, and
solution architectures,” IEEE Access, vol. 7, pp. 82 721–82 743,
2019.
[11] M. A. Amanullah, R. A. A. Habeeb, F. H. Nasaruddin, A. Gani,
E. Ahmed, A. S. M. Nainar, N. M. Akim, and M. Imran, “Deep
learning and big data technologies for iot security, Computer
Communications, vol. 151, pp. 495–517, 2020.
[12] R. Asif, “Post-quantum cryptosystems for internet-of-things: a sur-
vey on lattice-based algorithms, IoT, vol. 2, no. 1, pp. 71–91, 2021.
[13] A. Attkan and V. Ranga, “Cyber-physical security for iot networks:
a comprehensive review on traditional, blockchain and artificial
intelligence based key-security, Complex &Intelligent Systems, pp.
1–33, 2022.
[14] M. Rana, Q. Mamun, and R. Islam, “Lightweight cryptography in
iot networks: A survey,” Future Generation Computer Systems, vol.
129, pp. 77–89, 2022.
[15] J. Fruhlinger, “The mirai botnet explained: How iot
devices almost brought down the internet, Mar 2018.
[Online]. Available: https://www.csoonline.com/article/3258748/
the-mirai- almost-brought- down-the-internet.html
[16] D. Kushner, “The real story of stuxnet, Jul 2021. [Online].
Available: https://spectrum.ieee.org/the-real- story-of- stuxnet
[17] T. D. J. 20, T. D. , and A. Dunlap, “The
5 worst examples of iot hacking and vulnerabilities
in recorded history, Mar 2022. [Online]. Available:
https://www.iotforall.com/5-worst-iot- hacking-vulnerabilities
[18] A. E. Montalbano and E. Montalbano, “Millions of routers, iot
devices at risk from botenago malware. [Online]. Available:
https://threatpost.com/routers-iot- open-source- malware
[19] M. Abdulraheem, J. B. Awotunde, R. G. Jimoh, and I. D. Oladipo,
“An ecient lightweight cryptographic algorithm for iot security,”
in International Conference on Information and Communication
Technology and Applications. Springer, 2020, pp. 444–456.
[20] K. Sha, R. Errabelly, W. Wei, T. A. Yang, and Z. Wang, “Edgesec:
Design of an edge layer security service to enhance iot security,
in 2017 IEEE 1st International Conference on Fog and Edge
Computing (ICFEC). IEEE, 2017, pp. 81–88.
[21] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing
for the internet of things: Security and privacy issues, IEEE Internet
Computing, vol. 21, no. 2, pp. 34–42, 2017.
[22] H. Haddadi, V. Christophides, R. Teixeira, K. Cho, S. Suzuki, and
A. Perrig, “Siotome: An edge-isp collaborative architecture for iot
security, Proc. IoTSec, 2018.
[23] R.-H. Hsu, J. Lee, T. Q. Quek, and J.-C. Chen, “Reconfigurable
security: Edge-computing-based framework for iot, IEEE Network,
vol. 32, no. 5, pp. 92–99, 2018.
[24] P. Zhang, C. Jiang, X. Pang, and Y. Qian, “Stec-iot: A security tactic
by virtualizing edge computing on iot,” IEEE Internet of Things
Journal, vol. 8, no. 4, pp. 2459–2467, 2020.
[25] A. Murugesan, B. Saminathan, F. Al-Turjman, and R. L. Kumar,
“Analysis on homomorphic technique for data security in fog
computing,” Transactions on Emerging Telecommunications Tech-
nologies, vol. 32, no. 9, p. e3990, 2021.
[26] S. Amanlou, M. K. Hasan, and K. A. A. Bakar, “Lightweight and
secure authentication scheme for iot network based on publish–
subscribe fog computing model,” Computer Networks, vol. 199, p.
108465, 2021.
[27] J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on
attacks, security issues and blockchain solutions for iot and iiot,”
Journal of Network and Computer Applications, vol. 149, p. 102481,
2020.
[28] P. Koshy, S. Babu, and B. Manoj, “Sliding window blockchain
architecture for internet of things,” IEEE Internet of Things Journal,
vol. 7, no. 4, pp. 3338–3348, 2020.
[29] C. K. Pyoung and S. J. Baek, “Blockchain of finite-lifetime blocks
with applications to edge-based iot,” IEEE Internet of Things
Journal, vol. 7, no. 3, pp. 2102–2116, 2019.
[30] S. Latif, Z. Idrees, J. Ahmad, L. Zheng, and Z. Zou, “A blockchain-
based architecture for secure and trustworthy operations in the
http:// journals.uob.edu.bh
1240 Iraq Reshi, et al.: Challenges for Security in IoT, Emerging Solutions, and Research Directions
industrial internet of things,” Journal of Industrial Information
Integration, vol. 21, p. 100190, 2021.
[31] B. Bhushan, C. Sahoo, P. Sinha, and A. Khamparia, “Unification
of blockchain and internet of things (biot): requirements, working
model, challenges and future directions,” Wireless Networks, vol. 27,
no. 1, pp. 55–90, 2021.
[32] O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak, “A survey
on boosting iot security and privacy through blockchain, Cluster
Computing, vol. 24, no. 1, pp. 37–55, 2021.
[33] A. Al Sadawi, M. S. Hassan, and M. Ndiaye, A survey on the
integration of blockchain with iot to enhance performance and
eliminate challenges,” IEEE Access, vol. 9, pp. 54478–54 497, 2021.
[34] M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and
M. Guizani, “A survey of machine and deep learning methods for
internet of things (iot) security, IEEE Communications Surveys &
Tutorials, vol. 22, no. 3, pp. 1646–1685, 2020.
[35] H. Hindy, R. Atkinson, C. Tachtatzis, J.-N. Colin, E. Bayne, and
X. Bellekens, “Utilising deep learning techniques for eective zero-
day attack detection,” Electronics, vol. 9, no. 10, p. 1684, 2020.
[36] M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, “A machine
learning security framework for iot systems, IEEE Access, vol. 8,
pp. 114 066–114 077, 2020.
[37] H. Jafari, O. Omotere, D. Adesina, H.-H. Wu, and L. Qian, “Iot
devices fingerprinting using deep learning,” in MILCOM 2018-2018
IEEE Military Communications Conference (MILCOM). IEEE,
2018, pp. 1–9.
[38] S. Roy, J. Li, B.-J. Choi, and Y. Bai, “A lightweight supervised
intrusion detection mechanism for iot networks,” Future Generation
Computer Systems, vol. 127, pp. 276–285, 2022.
[39] S. Panja, K. Yadav, and A. Nag, Anomaly detection at the iot
edge in iot-based smart home environment using deep learning, in
Proceedings of International Conference on Advanced Computing
Applications. Springer, 2022, pp. 119–125.
[40] X. Wu, Y. Zhang, M. Shi, P. Li, R. Li, and N. N. Xiong, An adaptive
federated learning scheme with dierential privacy preserving,
Future Generation Computer Systems, vol. 127, pp. 362–372, 2022.
[41] A. Khalid, S. McCarthy, M. O’Neill, and W. Liu, “Lattice-based
cryptography for iot in a quantum world: Are we ready?” in 2019
IEEE 8th International Workshop on Advances in Sensors and
Interfaces (IWASI). IEEE, 2019, pp. 194–199.
[42] A. Lohachab, A. Lohachab, and A. Jangra, “A comprehensive survey
of prominent cryptographic aspects for securing communication in
post-quantum iot networks,” Internet of Things, vol. 9, p. 100174,
2020.
[43] J. Kr¨
amer, “Post-quantum cryptography and its application to the
iot,” Informatik Spektrum, vol. 42, no. 5, pp. 343–344, 2019.
[44] Z. A. Abdulkader et al., “A secure iot system using quantum
cryptography with block cipher, Journal of Applied Science and
Engineering, vol. 24, no. 5, pp. 771–776, 2021.
[45] K. Seyhan, T. N. Nguyen, S. Akleylek, K. Cengiz, and S. H. Islam,
“Bi-gisis ke: Modified key exchange protocol with reusable keys
for iot security, Journal of Information Security and Applications,
vol. 58, p. 102788, 2021.
[46] E. Karacan, S. Akleylek, and A. Karakaya, “Pq-flat: A new
quantum-resistant and lightweight authentication approach for m2m
devices, in 2021 9th International Symposium on Digital Forensics
and Security (ISDFS). IEEE, 2021, pp. 1–5.
[47] R. M. De Leon, A. M. Sison, and R. P. Medina, “A modified tiny
encryption algorithm using key rotation to enhance data security for
internet of things,” in 2019 International Conference on Information
and Communications Technology (ICOIACT). IEEE, 2019, pp. 56–
60.
[48] C. K. Rajak and A. Mishra, “Implementation of modified tea to
enhance security, in International Conference on Information and
Communication Technology for Intelligent Systems. Springer, 2017,
pp. 373–383.
[49] R. Chatterjee and R. Chakraborty, A modified lightweight present
cipher for iot security, in 2020 International Conference on Com-
puter Science, Engineering and Applications (ICCSEA). IEEE,
2020, pp. 1–6.
[50] O. R. Oluwade, O. M. Olaniyi, Y. S. Abdulsalam, L. A. Ajao,
and F. B. Osang, “Eteash-an enhanced tiny encryption algorithm
for secured smart home,” 2021.
[51] S. Banani, S. Thiemjarus, K. Wongthavarawat, and N. Ounanong,
“A dynamic light-weight symmetric encryption algorithm for secure
data transmission via ble beacons,” Journal of Sensor and Actuator
Networks, vol. 11, no. 1, p. 2, 2022.
[52] M. K. Nayak and P. K. Swain, “Esit: An enhanced lightweight
algorithm for secure internet of things,” in IoT and Analytics for
Sensor Networks. Springer, 2022, pp. 107–116.
[53] T. Islam, R. A. Youki, B. R. Chowdhury, and A. Hasan, An
ecc based secure communication protocol for resource constraints
iot devices in smart home,” in Proceedings of the International
Conference on Big Data, IoT, and Machine Learning. Springer,
2022, pp. 431–444.
[54] C. Gonzalez, S. M. Charfadine, O. Flauzac, and F. Nolot, “Sdn-
based security framework for the iot in distributed grid, in 2016
international multidisciplinary conference on computer and energy
science (SpliTech). IEEE, 2016, pp. 1–5.
[55] W. Liu, L. Zhang, Z. Zhang, C. Gu, C. Wang, M. O’neill, and
F. Lombardi, “Xor-based low-cost reconfigurable pufs for iot secu-
rity, ACM Transactions on Embedded Computing Systems (TECS),
vol. 18, no. 3, pp. 1–21, 2019.
Iraq A Reshi Iraq A. Reshi is a Research
Scholar at department of Computer Science
Engineering, Islamic University of Science
and Technology Awantipora, Pulwama , JK,
India . He has pursued his B.Tech from
National Institute of Technology Srinagar,
India, and M.Tech from Central University
of Kashmir, India. His research focuses on
Security, Blockchain, and Internet of Things.
http:// journals.uob.edu.bh
Int. J. Com. Dig. Sys. 12, No.1, 1231-1241 (Oct-2022) 1241
Sahil Sholla Sahil Sholla Sahil Sholla, is
Assistant Professor at department of Com-
puter Science Engineering, Islamic Univer-
sity of Science and Technology Awantipora,
Pulwama, JK, India .He has received PhD
from National Institute of Technology Srina-
gar, India. His research focuses on technol-
ogy ethics, security,Blockchain and Internet
of Things.
http:// journals.uob.edu.bh
... Blockchain presents a promising framework inside the vast network of interconnected IoT devices to develop a complete and decentralised system for verifying the authenticity of IoT data . The peerto-peer network of this technology distributes and controls data over numerous nodes worldwide, providing essential resilience and authentication procedures for safeguarding IoT devices [4,8]. The concept of blockchain emerged as a viable option to possess such prominent attributes. ...
... Various industries, are progressively utilising the IoT and cloud computing services to monitor critical applications such as industrial control This article is part of the Topical Collection: 4 -Track on IoT Guest Editor: Peter Langendoerfer B Iraq Ahmad Reshi rshiraq333@gmail.com 1 Department of CSE, Islamic University of Science and Technology, Awantipora, Kashmir, J&K, India systems and smart grids. The main objective is to enhance efficiency and reduce operational costs [1,2,4].The essential data of the IoT is stored within a third-party cloud service provider as part of the conventional architecture for IoTcloud integration [3].Nevertheless, integrating these devices present challenges, particularly in managing the limited resources available for interconnected devices and addressing concerns regarding the possible vulnerability of sensitive IoT data [4]. It is important to recognise that cloud servers, essential to the traditional IoT-cloud structure, possess extensive knowledge of the data they store, which leads to privacy concerns. ...
... Various industries, are progressively utilising the IoT and cloud computing services to monitor critical applications such as industrial control This article is part of the Topical Collection: 4 -Track on IoT Guest Editor: Peter Langendoerfer B Iraq Ahmad Reshi rshiraq333@gmail.com 1 Department of CSE, Islamic University of Science and Technology, Awantipora, Kashmir, J&K, India systems and smart grids. The main objective is to enhance efficiency and reduce operational costs [1,2,4].The essential data of the IoT is stored within a third-party cloud service provider as part of the conventional architecture for IoTcloud integration [3].Nevertheless, integrating these devices present challenges, particularly in managing the limited resources available for interconnected devices and addressing concerns regarding the possible vulnerability of sensitive IoT data [4]. It is important to recognise that cloud servers, essential to the traditional IoT-cloud structure, possess extensive knowledge of the data they store, which leads to privacy concerns. ...
Article
Full-text available
The inherent challenges associated with the Internet of Things (IoT), such as vulnerability to cyber threats and privacy issues, need the development of novel solutions to ensure secure and efficient handling of data. Fog computing resolves these concerns by facilitating data processing in proximity to edge devices, minimising latency, and improving real-time decision-making. Blockchain boosts security in fog-based systems by providing a tamper-proof and transparent ledger. However, exclusively prioritising privacy in fog-based blockchains may impede the practical execution. This article presents the FogBlock Connect paradigm, which combines Fog computing and Blockchain through the implementation of a tailored Proxy Re-encryption (PRE) algorithm inspired by BBS98. This strategy guarantees enhanced data confidentiality while simultaneously upholding operational effectiveness in fog-based blockchains for Internet of Things applications. The efficiency and effectiveness of the suggested PRE algorithm over typical encryption methods are confirmed by comprehensive simulations utilising the Fobsim simulator. The FogBlock Connect paradigm entails the transmission of updates from nearby IoT devices to Fog servers for the purpose of creating and securely storing global updates, hence improving efficiency and performance. The paradigm ensures robust privacy measures, mitigates risks of single-point failures, and facilitates precise access control, establishing a basis for secure and resilient IoT applications. The CCA resistant formal security proof provides further validation for the strength and effectiveness of the suggested approach.
... Moreover, Internet of Things (IoT) devices present an enticing opportunity for malicious actors because of their capability to collect and transmit sensitive personal data, such as individual names, addresses, and credit card details. Hackers can facilitate the unauthorized infiltration of additional devices and data within a network by utilizing Internet of Things (IoT) devices as potential entry points [16]. In general, the issue of cybersecurity in the Internet of Things (IoT) presents a complex and formidable challenge that necessitates a comprehensive and holistic approach. ...
... Collaborative efforts among hardware and software manufacturers, network and infrastructure service providers, and end users are necessary to identify effective resolutions for these challenges. The deployment of security measures, establishment of standards, and promotion of best practices will be crucial in ensuring the security and privacy of IoT devices and the data they collect [16]. ...
... The architecture aims to ensure the secure and scalable transmission of IoT data from decentralized IoT applications at the fog layer. Artificial intelligence (AI) is employed in diverse domains of advanced technologies, including blockchain thinking , decentralized AI , the intelligence of things, and intelligent robots, among others, in the daily lives of individuals [16]. The convergence between artificial intelligence (AI) Internet of Things (IoT) enables the collection of a vast amount of data and facilitates its analysis. ...
Chapter
Full-text available
This book chapter presents an overview of the cybersecurity concerns of the Internet of Things (IoT). It investigates how artificial intelligence (AI) and blockchain technologies address these challenges. This chapter describes the growing number of accessories in IoT and the increasing sophistication of cyberattacks targeting these devices. Each of these factors presents its own set of unique security challenges. Furthermore, we are investigating the potential benefits of incorporating AI and blockchain into IoT cybersecurity. These advantages include improved threat detection and response, increased data privacy and integrity, and increased attack resistance. Moreover, we present a review of particular novel approaches in the field. This chapter presents brief case studies of AI and blockchain-based Internet of Things cybersecurity solutions. These case studies show the practical applications and benefits of these technologies in safeguarding Internet of Things environments. The chapter provides insights into the changing landscape of cybersecurity for the Internet of Things (IoT) and AI and blockchain’s role in mitigating cyber threats in this sector.
... Given that the existing solutions are insufficient, addressing the comprehensive spectrum of privacy, security, and scalability issues in IoT systems presents a substantial research challenge. The advent of Bitcoin alongside other cryptocurrencies popularised blockchain technology, which emerged as a revolutionary invention with wide-ranging applications across several industries [9,10]. The IoT is a promising field where interconnected gadgets share data and independently perform tasks. ...
... The selection of a consensus mechanism can substantially influence the efficiency and scalability of the blockchain network, especially in IoT systems where resources are constrained [16]. The blockchain is a highly suitable technology that can offer a safe and decentralised environment for IoT networks [9]. The security features blockchain offers are unparalleled and highly motivating [17,18]. ...
Article
Full-text available
An amalgamation of blockchain technology and the Internet of Things (IoT) has presented notable concerns regarding scalability, security, and privacy, particularly in IoT contexts with limited resources. Conventional blockchains, including traditional consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS), meet challenges in handling many transactions, meeting energy efficiency standards, and addressing privacy issues in blockchain-based IoT networks. This work presents a new fog-based blockchain paradigm that integrates the benefits of Proof of Authority (PoA) and Delegated Proof of Stake (DPoS) consensus mechanisms and a proxy re-encryption approach to guarantee improved efficiency and system security. The proposed architecture integrates three essential operational algorithms: Fog Node Operation, Blockchain Node Operation, and Privacy Preservation Mechanism. These algorithms manage data processing, ensure secure transactions, and maintain privacy. Fobsim is used to conduct a series of simulations to evaluate the performance of PoA, DPoS, PoW, and PoS. The results indicate that PoA and DPoS provide better transaction speed, energy efficiency, and scalability than conventional consensus. As illustrated in the results, PoA stands out for its deficient energy consumption, making it an ideal fit for IoT applications. This research addresses the pressing concerns of scalability, privacy, and energy efficiency in blockchain-enabled Internet of Things (B-IoT) systems. The results lay the foundation for the future advancement of integrated B-IoT systems that can enable extensive, real-time IoT applications.
... Reshi et al. [5] reviewed in their survey some of the challenges of securing IoT systems particularly, as well as how promising emerging technologies can be used as or to support security measures. ...
... Pervasive Health Monitoring (PHM) architectures present significant security concerns that need attention and resolution. Different potential solutions have been proposed in the literature [7], [9]- [13], including addressing security and privacy concerns using emerging technologies [5], [6], [8], [21]. ...
Conference Paper
Pervasive Health Monitoring (PHM) uses sensors and wearable devices and data analytics for real-time health monitoring. It enables early detection and personalized care interventions. This technology has the potential to revolutionize healthcare by improving proactive and preventive care. Besides, Deep learning (DL) based PHM is even more promising as it improves the discovery of complex patterns and correlations. This leads to precise health monitoring and personalized care, enhances diagnostics, and ultimately improves patient outcomes in the field of healthcare. However, privacy and security considerations must be addressed for successful implementation. This paper investigates the security and privacy concerns in Pervasive Health Monitoring architectures. It discusses through an illustrative DL-based PHM architecture the potential threats and attacks during the inference and training phases, and identifies key security and privacy issues. It also gives insights on countermeasures and technological solutions that can address security and privacy concerns in PHM architectures.
... The wide spread of devices on the Internet of Things (IoT) has become integrated into our daily routines, permeating a range of gadgets ranging from smart thermostats and wear- IRIT, University of Toulouse, Toulouse, France able fitness trackers to industrial sensors and autonomous vehicles. However, these devices display a series of security concerns that require attention to safeguard the privacy and integrity of IoT systems [85]. To facilitate the seamless control and optimization of IoT devices, a social network has been established to facilitate communication between user IoT devices, allowing data sharing such as images, songs and text, as well as service requests [116]. ...
Article
Full-text available
The rapid growth of Web3 trends has accelerated the exploration and adoption of decentralization, with blockchain technology providing enhanced security measures. In recent years, the ability of secure systems to detect and counter evolving attacks has been increasingly challenged as attackers devise novel strategies to gain the trust of users and devices. Through trust-related attacks, these malicious actors manipulate or introduce false ratings, artificially inflating the reputation of malicious nodes within the network. From this perspective, Trust Management Systems (TMS) play a pivotal role in identifying and neutralizing malicious entities. However, conventional TMS focus solely on trust assessment without considering the composition, updating, and propagation phases necessary to build a reliable and scalable system capable of supporting real-world applications. Although integrating blockchain into trust management systems strengthens distributed trust assessment through a decentralized architecture, it also introduces challenges related to scalability, deployment, and the cost of maintaining consensus protocols and smart contracts. In this survey, our objective is to examine the existing blockchain-based TMS, propose a new methodology, and highlight open issues and emerging challenges. Our study emphasizes the importance of integrating distributed TMS while ensuring coordination among trust phases. We underscore the potential of employing graph databases to enable efficient trust distribution and dynamic updates. Furthermore, we identify critical issues related to scalability, reliability, storage, computational costs, and real-time integration within Social Internet of Things (SIoT) environments. To address these challenges, we propose a methodology for upgrading conventional TMS to distributed systems based on blockchain technology.
... The resource restraints of IoT, like limited processing power, may hinder direct integration with resource-intensive blockchain networks. In addition, scalability and latency issues must be carefully addressed to handle the large-scale data generated by IoT devices Reshi and Sholla, 2022). ...
Chapter
The more intelligent devices connect to the Internet, the more security and privacy breaches. This research explores integrating the blockchain and the Internet of Things (IoT) technologies, referred to as the blockchain-based IoT (B-IoT), focusing on the opportunities, challenges, and solutions associated with this convergence. The emergence of B-IoT has the latent to transform several domains and industries by enhancing security, trust, and decentralized data management. It begins with an introduction that highlights the significance of B-IoT and outlines the research objectives. Next, a comprehensive literature review examines existing studies and frameworks on blockchain, IoT, and their convergence. This review identifies gaps in the current literature, setting the foundation for subsequent research. Finally, the research analyzes the opportunities offered by B-IoT, showcasing real-world examples and use cases in areas such as healthcare, supply chain management, and energy systems. However, integrating blockchain and IoT brings various challenges, including scalability, interoperability, security, and privacy concerns. These challenges are examined, focusing on their implications for adopting and implementing B-IoT solutions. The chapter proposes potential solutions, frameworks, and architectures to mitigate the limitations. It also explores case studies and experiments to validate and evaluate the proposed solutions’ effectiveness. The discussion section interprets the findings, comparing them with existing literature and theories. The conclusion summarizes the main contributions of the research and suggests future research to advance the field of B-IoT further. This research offers a comprehensive analysis of B-IoT, providing valuable insights and guidance for researchers, practitioners, and decision-makers in understanding and harnessing the potential of this emerging technology paradigm.
... While these solutions offer respite, they often cater to specific scenarios, necessitating the development of novel techniques that account for IoT nodes' energy, processing, and computational constraints. Moreover, current techniques require further refinements due to underlying flaws [20]. Considering the imminent ubiquity of IoT in the future, extensive research and efforts are indispensable in mitigating the risks associated with Black Hole attacks. ...
Article
Full-text available
The Internet of Things (IoT) and Wireless Sensor Networks (WSNs) have rapidly spread in recent decades, leading to remarkable innovation and integrated possibilities. The switch from IPv4 to IPv6, made possible by advancements in networking technology and the use of nanodevices, has further improved connectivity. This move allows for connecting a wider range of devices to servers. Nevertheless, the increasing interconnectivity has brought about difficulties in efficiently overseeing and analysing the enormous amount of data produced throughout all levels of the IoT. The requirement of comprehensive security management is particularly concerning for IoT devices due to their large quantity and small size. Within the layered architecture of IoT, the network layer assumes pivotal importance in ensuring security, bearing responsibility for storing routing information and executing corresponding decisions. The Black Hole attack is a frequently encountered and significant concern among the security attacks addressed. This paper thoroughly examines the consequences of the Black Hole attack on IoT networks, carefully analyzing its impact. Furthermore, it presents a novel mitigation algorithm designed to counter such threats efficiently. The research employs NS2 and Simulink to run extensive simulations, enabling the evaluation of network throughput and Packet Delivery Ratio (PDR). Applying the proposed mitigation strategy to a network affected by the Black Hole attack results in a significant improvement in throughput, which closely resembles that of an unaffected network. The observed Packet Delivery Ratio (PDR) is measured at 98.21%. This highlights the algorithm’s effectiveness in mitigating the detrimental effects of the Black Hole attack on IoT networks.
... However, addressing the integration challenges requires in-depth research focusing on efficient and scalable consensus algorithms, lightweight cryptography, privacy-preserving techniques, and energy-efficient mining algorithms. 22 Apart from providing a trustless environment for IoT devices, researchers are implementing blockchain for the security, data management, and monetization of IoT devices. Designing a secure and energy-efficient protocol that considers both IoT and blockchain technology is still an open issue, and there is a need to converge the technologies to make IoT devices scalable for particular blockchain types. ...
Article
Full-text available
The accelerated development of information and communication technologies has generated a demand for data storage that is effective, transparent, immutable, and secure. Distributed ledger technology and encryption techniques such as hashing and blockchain technology revolutionised the landscape by meeting these requirements. However, blockchain must overcome obstacles such as low latency, throughput, and scalability for its full potential. Investigating blockchain's structure, types, challenges, promises, and variants is necessary to understand blockchain and its capabilities comprehensively. This paper overviews various aspects, such as emergent blockchain protocols, models, concepts, and trends. We classify blockchain variants into five essential categories, DAG, TDAG, Sharding, Consensus, and Combining methods, based on the structure each follows, and conduct a comparative analysis. In addition, we explore current research tendencies. As technology progresses, it is essential to comprehend the fundamental requirements for blockchain development.
Article
Background: Today, computer networks are everywhere, and we utilize the Internet to access our home network. IoT networks connect home appliances and provide remote instructions. Access to any tool over an uncertain network attracts assaults. User authentication might be password- or biometric-based. Data security across a secure network like the Internet is difficult when authenticating a device. Hashing is used for validation and confidentiality in several encryption and decryption schemes. Classic cryptographic security methods require a lot of memory, processing power, and power. They cannot work with low-resource IoT devices. Method: Automatic Device-to-Device communiqué opens up new applications, yet network machines and devices have limited resources. A remote-access home device authentication mechanism is proposed in this research. A new, lightweight encryption approach based on Deoxyribonucleic- Acid (DNA) sequences is developed to make IoT device connections easy and secure. Home network and appliance controller devices use authentication tools. DNA sequences are random therefore we utilized them to create a secure secret key. Results: Efficiency and strength are advantages of the proposed method. Our method prevents replay, server spoofing, and man-in-the-middle attacks. The suggested method protects network users and devices. Conclusion: Meanwhile, we model the system and find that the network's delay, throughput, and energy consumption don't degrade considerably.
Article
Full-text available
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.
Article
Full-text available
Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for continuous health monitoring. Since the sensor nodes are resource-limited, on-node processing and advertisement of digested information via BLE beacon is a promising technique that can enable a node gateway to communicate with more sensor nodes and extend the sensor node’s lifetime before requiring recharging. This study proposes a Dynamic Light-weight Symmetric (DLS) encryption algorithm designed and developed to address the challenges in data protection and real-time secure data transmission via message advertisement. The algorithm uses a unique temporal encryption key to encrypt each transmitting packet with a simple function such as XOR. With small additional overhead on computational resources, DLS can significantly enhance security over existing baseline encryption algorithms. To evaluate its performance, the algorithm was utilized on beacon data encryption over advertising channels. The experiments demonstrated the use of the DLS encryption algorithm on top of various light-weight symmetric encryption algorithms (i.e., TEA, XTEA, PRESENT) and a MD5 hash function. The experimental results show that DLS can achieve acceptable results for avalanche effect, key sensitivity, and randomness in ciphertexts with a marginal increase in the resource usage. The proposed DLS encryption algorithm is suitable for implementation at the application layer, is light and energy efficient, reduces/removes the need for secret key exchange between sensor nodes and the server, is applicable to dynamic message size, and also protects against attacks such as known plaintext attack, brute-force attack, replaying attack, and differential attack.
Article
With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of IoT devices, traditional cryptographic protocols are no longer suited to all IoT environments, such as the smart city. As a result, researchers have been proposing various lightweight cryptographic algorithms and protocols to secure data on IoT networks. This paper discusses state-of-the-art lightweight cryptographic protocols for IoT networks and presents a comparative analysis of popular contemporary ciphers. In doing so, it has classified the most current algorithms into two parts: symmetric and asymmetric lightweight cryptography. Additionally, we evaluate several recently developed block cipher and stream cipher algorithms in terms of their security. In the final section of this paper, we address the changes that need to be made and suggest future research topics.
Article
In our days Iot technology used in a wide aspect of life and became an important topic for researchers in the scope of the technologies. Although all these benefits it needs more security and stays have security intimidation, such as data breaking or channel attacks via eavesdroppers and viruses, especially when the people used IoT for long distance for example for city or country, etc. or even using IoT to transfer secret information about things in big offices, for this reasons needed to use a method which increases IoT security and protection our special data. In this paper, we will use the internet of things IoT with quantum key distribution (QKD) and block cipher RC6 algorithm, where QKD is the science and art of using the quantum mechanical effect to perform cryptographic tasks and generates a secret key. Also, we need to overcome the loss of information which occurs because the information transition effected by noise or outside operators when using quantum cryptography, so the optimal solution is using the quantum bit error rate (QBER) to produce a more safe way for quantum communication among things in IoT techniques. QBER is done by using servers to correct error after sending a key for decryption method by another server to decrypt information using RC6 block cipher algorithm, during creating a secret key we need to calculate quantum correct probability and compare the result with threshold suggested and agreed by the servers.
Article
As the Internet of Things (IoT) is becoming increasingly popular, we have experienced more security breaches that are associated with the connection of vulnerable IoT devices. Therefore, it is crucial to employ intrusion detection techniques to mitigate attacks that exploit IoT security vulnerabilities. However, due to the limited capabilities of IoT devices and the specific protocols used, conventional intrusion detection mechanisms may not work well for IoT environments. In this paper, we propose a novel intrusion detection model that uses machine learning to effectively detect cyber-attacks and anomalies in resource-constraint IoT networks. Through a set of optimizations including removal of multicollinearity, sampling, and dimensionality reduction, our model can identify the most important features to detect intrusions using much fewer training data and less training time. Extensive experiments were performed on the CICIDS2017 and NSL-KDD datasets respectively to evaluate the proposed approach. The experimental results on two popular datasets show that our model has a high detection rate and a low false alarm rate. It outperforms existing models in multiple performance metrics and is consistent in classifying major cyber-attacks, respectively. Most importantly, unlike traditional resource-intensive intrusion detection systems, the proposed model is lightweight and can be deployed on IoT nodes with limited power and storage capabilities.
Article
Driven by the upcoming development of the sixth-generation communication system (6G), the distributed machine learning schemes represented by federated learning has shown advantages in data utilization and multi-party cooperative model training. The total communication costs of federated learning is related to the number of communication rounds, the communication consumption of each participants, the setting of reasonable learning rate and the guarantee of calculation fairness. In addition, the isolating data strategy in the federated learning framework cannot completely guarantee the privacy security of users. Motivated by the above problems, this paper proposes a federated learning scheme combined with the adaptive gradient descent strategy and differential privacy mechanism, which is suitable for multi-party collaborative modeling scenarios. To ensure that federated learning scheme can train efficiently with limited communications costs, the adaptive learning rate algorithm is innovatively used to adjust the gradient descent process and avoid the model overfitting and fluctuation phenomena, so as to improve the modeling efficiency and performance in multi-party calculation scenarios. Furthermore, in order to adapt to the ultra-large-scale distributed secure computing scenario, this research introduces differential privacy mechanism to resist various background knowledge attacks. Experimental results demonstrate that the proposed adaptive federated learning model performs better than the traditional models under fixed communication costs. This novel modeling scheme also has strong robustness to different super-parameter settings and provides stronger quantifiable privacy preserving for federated learning process.
Article
The Internet of Things (IoT) has converged with Cloud computing to provide comprehensive services to users in different places. However, with the exponential growth of smart devices connected to the Internet, Cloud computing has severe challenges, especially for applications that require low-latency and real-time processing. Therefore, the Fog computing paradigm emerged that is more compatible with the IoT, in which events are processed near where they occurred for practical and quick response time. Authentication is an essential issue for og computing security since fog gateways and IoT devices are subject to many attacks. The main problem to provide authentication between IoT devices is that they have limited resources and computational processing. On the one hand, certificate-based authentication algorithms are secure but they are heavy for IoT devices. On the other hand, Pre-shared authentication algorithms such as PSK are suitable for low resource devices but are not widely used due to their low security. Therefore, this paper proposes to use the Ephemeral Elliptic Curve Diffie–Hellman (ECDHE) key exchange algorithm along with the Pre-Shared Key (PSK) as a lightweight and secure authentication scheme between the fog gateway and IoT device based on the Message Queuing Telemetry Transport (MQTT) publish–subscribe protocol in a distributed fog computing architecture. The proposed ECDHE-PSK authentication scheme uses Ephemeral Pre-shared key instead of heavy certificates that is very lightweight and also provides Perfect Forward Secrecy (PFS) feature to enhance security in comparison with the static PSK algorithm. To evaluate the resource consumption and security resistance of the proposed scheme it was implemented on the real test environment and then was compared with two state-of-the-art certificate-based authentication schemes and a static PSK-based scheme. The comprehensive performance and security evaluations showed that in the distributed publish–subscribe fog computing architecture the proposed ECDHE-PSK is almost as light as the PSK algorithm while has all security features of certificate-based algorithms.