Attacks, Challenges, and Countermeasures for an Integrated IoT Framework
-
Published:2024-08-15
Issue:2
Volume:12
Page:28-39
-
ISSN:2376-7731
-
Container-title:Internet of Things and Cloud Computing
-
language:en
-
Short-container-title:IOTCC
Author:
Alaba Fadele1ORCID, Madu Ifeyinwa2ORCID, Musa Haliru3
Affiliation:
1. Department of Computer Science, Federal College of Education, Zaria, Nigeria 2. Department of Mathematics, Morgan State University Baltimore, Maryland, USA 3. Department of Chemistry, Federal College of Education, Zaria, Nigeria
Abstract
The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.
Publisher
Science Publishing Group
Reference43 articles.
1. W. T. Sung, I. V. Devi, S. J. Hsiao, and F. N. Fadillah, “Smart Garbage Bin Based on AIoT,” Intell. Autom. Soft Comput., vol. 32, no. 3, pp. 1387–1401, 2022, https://doi.org/10.32604/IASC.2022.022828 2. M. Jingyao, Z. Gang, and Z. Ling, “Governance mechanisms implementation in the evolution of digital platforms: a case study of the Internet of Things platform,” R D Manag., vol. 52, no. 3, pp. 498–516, 2022, https://doi.org/10.1111/radm.12494 3. K. P. Seng, L. M. Ang, and E. Ngharamike, “Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks,” Int. J. Distrib. Sens. Networks, vol. 18, no. 3, 2022, https://doi.org/10.1177/15501477211062835 4. P. Title and T. Name, “Presentation Schedule,” pp. 1–13, 2023, https://doi.org/10.1109/globconet56651.2023.10150157 5. K. Boikanyo, A. M. Zungeru, B. Sigweni, A. Yahya, and C. Lebekwe, “Remote patient monitoring systems: Applications, architecture, and challenges,” Sci. African, vol. 20, no. March, p. e01638, 2023, https://doi.org/10.1016/j.sciaf.2023.e01638
|
|