Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Security Trends in Internet-of-things for Ambient Assistive Living: A Review

Author(s): Ankit D. Patel, Rutvij H. Jhaveri*, Kaushal A. Shah, Ashish D. Patel, Rajkumar S. Rathore, Manish Paliwal, Kumar Abhishek and Dhavalkumar Thakker

Volume 17, Issue 7, 2024

Published on: 12 December, 2023

Article ID: e121223224370 Pages: 29

DOI: 10.2174/0126662558270314231129051456

Price: $65

Abstract

The Internet of Things (IoT) has revolutionized our society and become indispensable to modern existence. The IoT allows users to access their electronic gadgets from any location. The widespread adoption of IoT across sectors, from manufacturing to surveillance to elder care, has contributed to its rising profile. New security risks and challenges arise with the growth of the IoT. With the development of IoT, the likelihood of an attack by hackers has increased. The burden of addressing these dangers falls on researchers and security professionals. This article looks into the challenges of IoT security in a real-world Ambient Assisted Living (AAL) environment. This work discusses the numerous security attacks employed by cybercriminals in AAL IoT. In addition, this research investigates the varied responses to the risks. We discussed the state-of-the-art technologies available for protecting AAL IoT networks. This work analyses and compares the majority of the latest technologies available. In conclusion, we offer a few suggestions for where the field could go from the current scenario.

Graphical Abstract

[1]
S. Panchiwala, and M. Shah, "“A comprehensive study on critical security issues and challenges of the IOT world”, J. Data", Informa. Manag., vol. 2, no. 4, pp. 257-278, 2020.
[http://dx.doi.org/10.1007/s42488-020-00030-2]
[2]
G. Hegde, Study of IoT: Unerstanding iot architecture, applications, issues and challengeds , Int. J. Adv. Net. Appl., 2016..
[3]
S. Li, L.D. Xu, and S. Zhao, "The internet of things: A survey", Inf. Syst. Front., vol. 17, no. 2, pp. 243-259, 2015.
[http://dx.doi.org/10.1007/s10796-014-9492-7]
[4]
A.A. Laghari, K. Wu, R.A. Laghari, M. Ali, and A.A. Khan, "A review and state of art of Internet of Things (IoT)", Arch. Comput. Methods Eng., pp. 1-19, 2021.
[5]
P.P Ray, A survey on internet of things architectures J. King Saud Univ.-Comput. Inform. Sci., pp. 291-319, 2018..
[http://dx.doi.org/10.1109/IEMCON.2018.8614931]
[6]
T. Alam, A Reliable Communication Framework and its Use in Internet of Things (IoT) Int. J.f Sci. Res. Comput. Sci., Eng. Informa. Technol., vol. 3, no. 5, 2018..
[7]
A. Khanna, and S. Kaur, "Internet of things (IoT), applications and challenges: A comprehensive review", Wirel. Pers. Commun., vol. 114, no. 2, pp. 1687-1762, 2020.
[http://dx.doi.org/10.1007/s11277-020-07446-4]
[8]
S. Nižetić, and P. Šolić, "D. López-de-Ipiña González-de-Artaza, and L. Patrono, “Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future”", J. Clean. Prod., vol. 274, p. 122877, .
2020 [http://dx.doi.org/10.1016/j.jclepro.2020.122877] [PMID: 32834567]
[9]
A.H. Mohd Aman, E. Yadegaridehkordi, Z.S. Attarbashi, R. Hassan, and Y.J. Park, "A survey on trend and classification of internet of things reviews", IEEE Access, vol. 8, pp. 111763-111782, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3002932]
[10]
S.N. Swamy, and S.R. Kota, "An empirical study on system level aspects of Internet of Things (IoT)", IEEE Access, vol. 8, pp. 188082-188134, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3029847]
[11]
B. Gupta, and M. Quamara, An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols.", In: Concurrency and Computation: Practice And Experience., John Wiley & Sons, 2018.
[12]
Y. Harbi, Z. Aliouat, S. Harous, A. Bentaleb, and A. Refoufi, "A review of security in internet of things", Wirel. Pers. Commun., vol. 108, no. 1, pp. 325-344, 2019.
[http://dx.doi.org/10.1007/s11277-019-06405-y]
[13]
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and security: Challenges and solutions", Appl. Sci. , vol. 10, no. 12, p. 4102, 2020.
[http://dx.doi.org/10.3390/app10124102]
[14]
Z. Lv, "Security of Internet of Things edge devices", Softw. Pract. Exper., vol. 51, no. 12, pp. 2446-2456, 2021.
[http://dx.doi.org/10.1002/spe.2806]
[15]
M.A. Khan, and K. Salah, "IoT security: Review, blockchain solutions, and open challenges", Future Gener. Comput. Syst., vol. 82, pp. 395-411, 2018.
[http://dx.doi.org/10.1016/j.future.2017.11.022]
[16]
J.J. Hathaliya, and S. Tanwar, "An exhaustive survey on security and privacy issues in Healthcare 4.0", Comput. Commun., vol. 153, pp. 311-335, 2020.
[http://dx.doi.org/10.1016/j.comcom.2020.02.018]
[17]
B. Rachit, Security trends in Internet of Things: A survey., SN Applied Sciences, 2021, pp. 1-14.
[18]
S.N. Mahapatra, B.K. Singh, and V. Kumar, "A survey on secure transmission in internet of things: Taxonomy, recent techniques, research requirements, and challenges", Arab. J. Sci. Eng., vol. 45, no. 8, pp. 6211-6240, 2020.
[http://dx.doi.org/10.1007/s13369-020-04461-2]
[19]
S.K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, "Security of internet of things based on cryptographic algorithms: A survey", Wirel. Netw., vol. 27, no. 2, pp. 1515-1555, 2021.
[http://dx.doi.org/10.1007/s11276-020-02535-5]
[20]
T. Nandy, M.Y.I.B. Idris, R. Md Noor, L. Mat Kiah, L.S. Lun, N.B. Annuar Juma’at, I. Ahmedy, N. Abdul Ghani, and S. Bhattacharyya, "Review on security of Internet of Things authentication mechanism", IEEE Access, vol. 7, pp. 151054-151089, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2947723]
[21]
S.F. Tan, and A. Samsudin, "Recent technologies, security countermeasure and ongoing challenges of industrial internet of things (IIoT): A survey", Sensors , vol. 21, no. 19, p. 6647, 2021.
[http://dx.doi.org/10.3390/s21196647] [PMID: 34640967]
[22]
S.M. Tahsien, H. Karimipour, and P. Spachos, "Machine learning based solutions for security of Internet of Things (IoT): A survey", J. Netw. Comput. Appl., vol. 161, p. 102630, .
2020 [http://dx.doi.org/10.1016/j.jnca.2020.102630]
[23]
D.E. Kouicem, A. Bouabdallah, and H. Lakhlef, "Internet of things security: A top-down survey", Comput. Netw., vol. 141, pp. 199-221, 2018.
[http://dx.doi.org/10.1016/j.comnet.2018.03.012]
[24]
P. Malhotra, Y. Singh, P. Anand, D.K. Bangotra, P.K. Singh, and W.C. Hong, "Internet of things: Evolution, concerns and security challenges", Sensors , vol. 21, no. 5, p. 1809, 2021.
[http://dx.doi.org/10.3390/s21051809] [PMID: 33807724]
[25]
M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, "Internet of things security: Challenges and key issues", Secur. Commun. Netw., vol. 2021, pp. 1-11, 2021.
[http://dx.doi.org/10.1155/2021/5533843]
[26]
S. Hashemi, and M. Zarei, "Internet of Things backdoors: Resource management issues, security challenges, and detection methods", Trans. Emerg. Telecommun. Technol., vol. 32, no. 2, p. e4142, .
2021 [http://dx.doi.org/10.1002/ett.4142]
[27]
N. Mishra, and S. Pandya, "Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review", IEEE Access, vol. 9, pp. 59353-59377, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3073408]
[28]
M. Goyal, "Enhancing security in Internet of Things using authentication techniques: A review survey", J. Phys. Conf. Ser., vol. 2007, no. 1, p. 012023, .
2021 [http://dx.doi.org/10.1088/1742-6596/2007/1/012023]
[29]
M. Aly, F. Khomh, M. Haoues, and A. Quintero, "Enforcing security in Internet of Things frameworks: A systematic literature review", Int. Things J., vol. 6, p. 100050, . 2019
[30]
Z. Ghaffar, A. Alshahrani, M. Fayaz, A. Alghamdi, and J. Gwak, "A topical review on machine learning, software defined networking, internet of things applications: Research limitations and challenges", Electronics , 2021.
[31]
M.M. Ogonji, G. Okeyo, and J.M. Wafula, "A survey on privacy and security of Internet of Things", Comput. Sci. Rev., vol. 38, p. 100312, .
2020 [http://dx.doi.org/10.1016/j.cosrev.2020.100312]
[32]
G. Uganya, "Radhika, and N. Vijayaraj, “A survey on internet of things: Applications, recent issues, attacks, and security mechanisms”", J. Circuits Syst. Comput., vol. 30, no. 5, p. 2130006, .
2021 [http://dx.doi.org/10.1142/S0218126621300063]
[33]
O.I. Abiodun, E.O. Abiodun, M. Alawida, R.S. Alkhawaldeh, and H. Arshad, "A review on the security of the internet of things: Challenges and solutions", Wirel. Pers. Commun., vol. 119, no. 3, pp. 2603-2637, 2021.
[http://dx.doi.org/10.1007/s11277-021-08348-9]
[34]
K.S. Sudha, and N. Jeyanthi, "A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)", Cybern. Inf. Technol., vol. 21, no. 3, pp. 50-72, 2021.
[http://dx.doi.org/10.2478/cait-2021-0029]
[35]
V. Rao, and K.V. Prema, "A review on lightweight cryptography for Internet-of-Things based applications", J. Ambient Intell. Humaniz. Comput., vol. 12, no. 9, pp. 8835-8857, 2021.
[http://dx.doi.org/10.1007/s12652-020-02672-x]
[36]
S. Muzammal, R. Murugesan, and N. Jhanjhi, A comprehensive review on secure routing in internet of things: Mitigation methods and trust based approaches ", IEEE Internet Things J., vol. pp. 4186- 4210,, 2020.
[37]
J. Shah, and A. Patel, "Ambient assisted living system: The scope of research and development", In 2018 International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Tamilnadu, India, 2018.
[38]
P. Cedillo, C. Sanchez, K. Campos, and A. Bermeo, "A systematic literature review on devices and systems for ambient assisted living: Solutions and trends from different user perspectives International Conference One Democracy & eGovernment (ICEDEG), Ambato, Ecuador, 04-06 April, 2018",
[http://dx.doi.org/10.1109/ICEDEG.2018.8372367]
[39]
D. Bouchabou, S.M. Nguyen, C. Lohr, B. LeDuc, and I. Kanellos, "A survey of human activity recognition in smart homes based on IoT sensors algorithms: Taxonomies, challenges, and opportunities with deep learning", Sensors , vol. 21, no. 18, p. 6037, 2021.
[http://dx.doi.org/10.3390/s21186037] [PMID: 34577243]
[40]
M. Wu, T. Lu, F. Ling, J. Sun, and H. Du, "Research on the architecture of internet of things", In 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), Chengdu 2022 Aug,, 2010.
[41]
J.H. Nord, A. Koohang, and J. Paliszkiewicz, "The Internet of Things: Review and theoretical framework", Expert Syst. Appl., vol. 133, pp. 97-108, 2019.
[http://dx.doi.org/10.1016/j.eswa.2019.05.014]
[42]
K. Patel, and S. Patel, "Internet of things-IOT: Definition, characteristics, architecture, enabling technologies, application & future challenges", Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 6122-6131, 2016.
[43]
A. Tewari, and B.B. Gupta, "Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework", Future Gener. Comput. Syst., vol. 108, pp. 909-920, 2020.
[http://dx.doi.org/10.1016/j.future.2018.04.027]
[44]
D. Darwish, "Improved layered architecture for Internet of Things", Int. J. Curr. Adv. Res., pp. 214-223, 2015.
[45]
C. Sharma, and N. Gondhi, "Communication protocol stack for constrained IoT systems", In 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU)Bhimtal, India 23-24 Feb, 2018.
[http://dx.doi.org/10.1109/IoT-SIU.2018.8519904]
[46]
Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities", IEEE Wirel. Commun., vol. 20, no. 6, pp. 91-98, 2013.
[http://dx.doi.org/10.1109/MWC.2013.6704479]
[47]
P. Asghari, A.M. Rahmani, and H.H.S. Javadi, "Internet of Things applications: A systematic review", Comput. Netw., vol. 148, pp. 241-261, 2019.
[http://dx.doi.org/10.1016/j.comnet.2018.12.008]
[48]
Y. Harbi, Z. Aliouat, A. Refoufi, and S. Harous, "Recent security trends in internet of things: A comprehensive survey", IEEE Access, vol. 9, pp. 113292-113314, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3103725]
[49]
A.R. Javed, W. Ahmed, S. Pandya, P.K.R. Maddikunta, M. Alazab, and T.R. Gadekallu, "A survey of explainable artificial intelligence for smart cities", Electronics , vol. 12, no. 4, p. 1020, 2023.
[http://dx.doi.org/10.3390/electronics12041020]
[50]
L.G. Fahad, and S.F. Tahir, "Activity recognition and anomaly detection in smart homes", Neurocomputing, vol. 423, pp. 362-372, 2021.
[http://dx.doi.org/10.1016/j.neucom.2020.10.102]
[51]
T. Samizadeh Nikoui, A.M. Rahmani, A. Balador, and H. Haj Seyyed Javadi, "Internet of Things architecture challenges: A systematic review", Int. J. Commun. Syst. , vol. 34, no. 4, p. e4678, 2021..
[http://dx.doi.org/10.1002/dac.4678]
[52]
M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E.K. Markakis, "A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues", IEEE Commun. Surv. Tutor., vol. 22, no. 2, pp. 1191-1221, 2020.
[http://dx.doi.org/10.1109/COMST.2019.2962586]
[53]
A. Raghuvanshi, U. Kumar Singh, M. Shuaib, and S. Alam, "Withdrawn: An investigation of various applications and related security challenges of Internet of things", Mater. Today Proc., 2021.
[http://dx.doi.org/10.1016/j.matpr.2021.01.821]
[54]
S. Goyal, N. Sharma, B. Bhushan, A. Shankar, and M. Sagayam, Iot enabled technology in secured healthcare: applications, challenges and future directions.", In: Cognitive Internet of Medical Things for Smart Healthcare., Springer: Cham, 2021, pp. 25-48.
[55]
C.C. Sobin, "A survey on architecture, protocols and challenges in IoT", Wirel. Pers. Commun., vol. 112, no. 3, pp. 1383-1429, 2020.
[http://dx.doi.org/10.1007/s11277-020-07108-5]
[56]
R. Maskeliūnas, R. Damaševičius, and S. Segal, "A review of internet of things technologies for ambient assisted living environments", Fut. Internet, vol. 11, no. 12, p. 259, 2019.
[http://dx.doi.org/10.3390/fi11120259]
[57]
A. Dehghantanha, A survey on internet of things security: Requirements, challenges, and solutions., Int. Things, p. 100129. 2021
[58]
N. Saputro, S. Tonyali, A. Aydeger, K. Akkaya, M. Rahman, and S. Uluagac, A review of moving target defense mechanisms for Internet of Things applications., Model. Design Secure Int. Things, pp. 563-614.
2020 [http://dx.doi.org/10.1002/9781119593386.ch24]
[59]
Y. Li, X. Su, A.Y. Ding, A. Lindgren, X. Liu, C. Prehofer, J. Riekki, R. Rahmani, S. Tarkoma, and P. Hui, "Enhancing the internet of things with knowledge-driven software-defined networking technology: Future perspectives", Sensors , vol. 20, no. 12, p. 3459, 2020.
[http://dx.doi.org/10.3390/s20123459] [PMID: 32575354]
[60]
M. Frustaci, P. Pace, and G. Aloi, Evaluating critical security issues of the IoT world: Present and future challenges., IEEE Int. Things J., pp. 2483-2495. 2017
[61]
A. Čolaković, and M. Hadžialić, "Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues", Comput. Netw., vol. 144, pp. 17-39, 2018.
[http://dx.doi.org/10.1016/j.comnet.2018.07.017]
[62]
K. Ramana, A. Revathi, A. Gayathri, R.H. Jhaveri, C.V.L. Narayana, and B.N. Kumar, "Wogru-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks", Comput. Commun., vol. 196, pp. 195-206, 2022.
[http://dx.doi.org/10.1016/j.comcom.2022.10.001]
[63]
M. Jemmali, M. Denden, W. Boulila, G. Srivastava, R.H. Jhaveri, and T.R. Gadekallu, "A novel model based on window-pass preferences for data emergency aware scheduling in computer networks", IEEE Trans. Industr. Inform., vol. 18, no. 11, pp. 7880-7888, 2022.
[http://dx.doi.org/10.1109/TII.2022.3149896]
[64]
M. Ahmad, T. Younis, M. Habib, and R. Ashraf, A review of current security issues in internet of things., Recent Trends Adv. Wireless IoT-enabled Net, pp. 11-23. 2019
[65]
N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, "Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications", Sensors , vol. 21, no. 11, p. 3654, 2021.
[http://dx.doi.org/10.3390/s21113654]
[66]
P. Grammatikis, P. Sarigiannidis, and I. Moscholios, Securing the internet of things: Challenges, threats and solutions., Int. Things J., pp. 41-70. 2019
[67]
J. Mohanty, S. Mishra, S. Patra, B. Pati, and C. Panigrahi, IoT security, challenges, and solutions: A review ", Prog. Adv. Comput. Intell. Eng..
[68]
A. Patel, and K. Chawda, "Blackhole and grayhole attacks in MANET", In International Conference on Information Communication and Embedded Systems (ICICES 2014), Chennai, India 27-28 Feb,, 2014, pp. 1-6
[69]
A. Patel, "Addressing packet forwarding misbehavior with two phase security scheme for AODV-based MANETs", Int. J. Comput. Net. Inform. Secu., vol. 8, no. 5, pp. 55-62, 2016.
[70]
A. Patel, Dual security against grayhole attack in MANETs., Intell. Comput., Commun. Devices, pp. 33-37. 2015
[71]
R.H. Jhaveri, A. Desai, A. Patel, and Y. Zhong, "A sequence number prediction based bait detection scheme to mitigate sequence number attacks in MANETs", Secur. Commun. Netw., vol. 2018, pp. 1-13, 2018.
[http://dx.doi.org/10.1155/2018/3210207]
[72]
A. Mosenia, "A comprehensive study of security of internet of things", IEEE Trans. Emerg. Top. Comput., pp. 586-602, 2016.
[73]
S.G. Abbas, I. Vaccari, F. Hussain, S. Zahid, U.U. Fayyaz, G.A. Shah, T. Bakhshi, and E. Cambiaso, "Identifying and mitigating phishing attack threats in IoT use cases using a threat modelling approach", Sensors , vol. 21, no. 14, p. 4816, 2021.
[http://dx.doi.org/10.3390/s21144816]
[74]
C. Borrego, M. Amadeo, A. Molinaro, and R.H. Jhaveri, "Privacy preserving forwarding using homomorphic encryption for information centric wireless ad-hoc networks", IEEE Commun. Lett., vol. 23, no. 10, pp. 1708-1711, 2019.
[http://dx.doi.org/10.1109/LCOMM.2019.2927913]
[75]
M. Hossain, and M. Fotouhi, "Towards an analysis of security issues, challenges, and open problems in the internet of things", In 2015 IEEE World Congress on ServicesNew York, NY, USA , 27 June - 02 July, 2015, pp. 21-28
[http://dx.doi.org/10.1109/SERVICES.2015.12]
[76]
V.A. Thakor, M.A. Razzaque, and M.R.A. Khandaker, "Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities", IEEE Access, vol. 9, pp. 28177-28193, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3052867]
[77]
C. Patel, A. Bashir, A. AlZubi, and R. Jhaveri, EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element., Digital Communications and Networks, 2022.
[78]
M. Sinha, and S. Dutta, "Survey on lightweight cryptography algorithm for data privacy in internet of things", In Proceedings Of The Fourth International Conference on Microelectronics, Computing and Communication Systems .. Springer: Singapore, 2021, pp. 149-157
[http://dx.doi.org/10.1007/978-981-15-5546-6_13]
[79]
F. Takieldeen, and F. Khalifa, "Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey", J. Intell. Syst. Int. Things, vol. 5, no. 2, pp. 49-67, 2021.
[80]
P. Chandi, A. Sharma, A. Chhabra, and P. Gupta, "A DES-based mechanism to secure personal data on the internet of things", In International Conference on Communications and Cyber Physical Engineering .. Springer: Singapore, 2018.
[81]
A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang, "Pushing the limits: A very compact and a threshold implementation of AES", In Annual International Conference on The Theory and Applications of Cryptographic Techniques, 2011, pp. 69-88
[http://dx.doi.org/10.1007/978-3-642-20465-4_6]
[82]
L. Vidyashree, and B. Suresha, Methodology to secure agricultural data in IoT., Emerg. Technol. Data Mining Inform. Secur, pp. 129-139.
2019 [http://dx.doi.org/10.1007/978-981-13-1501-5_11]
[83]
M. Usman, I. Ahmed, M. Imran, S. Khan, and U. Ali, "SIT: A lightweight encryption algorithm for secure internet of things", Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 1, 2017.
[http://dx.doi.org/10.14569/IJACSA.2017.080151]
[84]
J. Wang, J. Li, H. Wang, L. Zhang, L. Cheng, and Q. Lin, "Dynamic scalable elliptic curve cryptographic scheme and its application to in vehicle security", IEEE Internet Things J., pp. 5892-5901, 2018.
[85]
T. Liu, Y. Wang, Y. Li, X. Tong, L. Qi, and N. Jiang, "Privacy protection based on stream cipher for spatiotemporal data in IoT", IEEE Internet Things J., vol. 7, no. 9, pp. 7928-7940, 2020.
[http://dx.doi.org/10.1109/JIOT.2020.2990428]
[86]
A. Gupta, M. Tripathi, T.J. Shaikh, and A. Sharma, "A lightweight anonymous user authentication and key establishment scheme for wearable devices", Comput. Netw., vol. 149, pp. 29-42, 2019.
[http://dx.doi.org/10.1016/j.comnet.2018.11.021]
[87]
J. Lee, Y. Sung, and J. Park, "Lightweight sensor authentication scheme for energy efficiency in ubiquitous computing environments", Sensors , vol. 16, no. 12, p. 2044, 2016.
[http://dx.doi.org/10.3390/s16122044] [PMID: 27916962]
[88]
L. Sliman, T. Omrani, Z. Tari, A Samhat, and R. Rhouma, Towards an ultra-lightweight block ciphers for Internet of Things J. Inform. Security Appl., p. 102897, 2021..
[http://dx.doi.org/10.1016/j.jisa.2021.102897]
[89]
B. Seok, J.C.S. Sicato, T. Erzhena, C. Xuan, Y. Pan, and J.H. Park, "Secure D2D communication for 5G IoT network based on lightweight cryptography", Appl. Sci. , vol. 10, no. 1, p. 217, 2019.
[http://dx.doi.org/10.3390/app10010217]
[90]
W. Jerbi, A. Guermazi, O. Cheikhrouhou, and H. Trabelsi, "CoopECC: A collaborative cryptographic mechanism for the internet of things", J. Sens., vol. 2021, pp. 1-8, 2021.
[http://dx.doi.org/10.1155/2021/8878513]
[91]
D. Sadhukhan, S. Ray, G.P. Biswas, M.K. Khan, and M. Dasgupta, "A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography", J. Supercomput., vol. 77, no. 2, pp. 1114-1151, 2021.
[http://dx.doi.org/10.1007/s11227-020-03318-7]
[92]
M. Masud, G. Gaba, K. Choudhary, M. Hossain, M. Alhamid, and G. Muhammad, Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare., IEEE Int. Things J., 2021.
[93]
S. Tu, M. Waqas, S.U. Rehman, M. Aamir, O.U. Rehman, Z. Jianbiao, and C-C. Chang, "Security in fog computing: A novel technique to tackle an impersonation attack", IEEE Access, vol. 6, pp. 74993-75001, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2884672]
[94]
P. Kuppusamy, N. Kumari, W. Alghamdi, H. Alyami, R. Ramalingam, A. Javed, and M. Rashid, Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization., J. Cloud Comput, p. 9.
2022 [http://dx.doi.org/10.1186/s13677-022-00380-9]
[95]
A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, "An attribute-based encryption scheme to secure fog communications", IEEE Access, vol. 5, pp. 9131-9138, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2705076]
[96]
A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the internet of things: Security and privacy issues", IEEE Int. Comput., vol. 21, no. 2, pp. 34-42, 2017.
[http://dx.doi.org/10.1109/MIC.2017.37]
[97]
S. Alharbi, P. Rodriguez, R. Maharaja, P. Iyer, and N. Subaschandrabose, "Secure the internet of things with challenge response authentication in fog computing IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, USA, 10-12 Dec, 2017",
[98]
J.S. Fu, Y. Liu, H.C. Chao, B.K. Bhargava, and Z-J. Zhang, "Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing", IEEE Trans. Industr. Inform., vol. 14, no. 10, pp. 4519-4528, 2018.
[http://dx.doi.org/10.1109/TII.2018.2793350]
[99]
L. Li, Z. Wang, and N. Li, "Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT", IEEE Access, vol. 8, pp. 176738-176749, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3025140]
[100]
P. Gope, "LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm", Comput. Secur., vol. 86, pp. 223-237, 2019.
[http://dx.doi.org/10.1016/j.cose.2019.06.003]
[101]
P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "“Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things”, IEEE] Int", Things J., vol. 4, no. 5, pp. 1143-1155, 2017.
[http://dx.doi.org/10.1109/JIOT.2017.2659783]
[102]
F. Aliyu, T. Sheltami, A. Mahmoud, L. Al-Awami, and A. Yasar, Detecting Man-in-the-Middle Attack in Fog Computing for Social Media., Tech Science Press, 2021.
[http://dx.doi.org/10.32604/cmc.2021.016938]
[103]
A.A. Diro, N. Chilamkurti, and N. Kumar, "Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing", Mob. Netw. Appl., vol. 22, no. 5, pp. 848-858, 2017.
[http://dx.doi.org/10.1007/s11036-017-0851-8]
[104]
K. Sha, T. Yang, W. Wei, and S. Davari, A survey of edge computing based designs for IoT security., Digital Commun. Net, pp. 195-202. 2020
[105]
G. Chaudhary, S. Srivastava, and M. Khari, Generative edge intelligence for securing IoT-assisted smart grid against cyber-threats., Int. J. Wireless Ad Hoc Commun, p. 060104.
2023. [http://dx.doi.org/10.54216/IJWAC.060104]
[106]
D. Montero, M. Yannuzzi, A. Shaw, L. Jacquin, A. Pastor, R. Serral-Gracia, A. Lioy, F. Risso, C. Basile, R. Sassu, M. Nemirovsky, F. Ciaccia, M. Georgiades, S. Charalambides, J. Kuusijarvi, and F. Bosco, "Virtualized security at the network edge: A user-centric approach", IEEE Commun. Mag., vol. 53, no. 4, pp. 176-186, 2015.
[http://dx.doi.org/10.1109/MCOM.2015.7081092]
[107]
K. Goldman, R. Perez, and R. Sailer, "Linking remote attestation to secure tunnel endpoints", In Proceedings of The First ACM Workshop on Scalable Trusted Computing, 2006, pp. 21-24
[http://dx.doi.org/10.1145/1179474.1179481]
[108]
T. Zhang, Y. Zhang, and R. Lee, "Cloudradar: A real-time side-channel attack detection system in clouds", In International Symposium on Research In Attacks, Intrusions, And Defenses . Springer: Cham,, 2016, pp. 118-140
[http://dx.doi.org/10.1007/978-3-319-45719-2_6]
[109]
H. Cui, X. Yi, and S. Nepal, "Achieving scalable access control over encrypted data for edge computing networks", IEEE Access, vol. 6, pp. 30049-30059, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2844373]
[110]
R.H. Hsu, J. Lee, T.Q.S. Quek, and J.C. Chen, "Reconfigurable security: Edgecomputing- based framework for IoT", IEEE Netw., vol. 32, no. 5, pp. 92-99, 2018.
[http://dx.doi.org/10.1109/MNET.2018.1700284]
[111]
J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, "An efficient messageauthentication scheme based on edge computing for vehicular ad-hoc networks", IEEE Trans. Intell. Transp. Syst., pp. 1621-1632, 2018.
[112]
M. Wazid, A.K. Das, S. Shetty, J. J P C. Rodrigues, and Y. Park, "LDAKMEIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment", Sensors , vol. 19, no. 24, p. 5539, 2019.
[http://dx.doi.org/10.3390/s19245539] [PMID: 31847431]
[113]
P. Zhang, C. Jiang, X. Pang, and Y. Qian, "STEC-IoT: A security tactic by virtualizing edge computing on IoT", IEEE Internet Things J., pp. 2459-2467, 2020.
[114]
J. Singh, Y. Bello, A. Hussein, A. Erbad, and A. Mohamed, "Hierarchical security paradigm for IoT multi-access edge computing", IEEE Internet Things J., pp. 5794-5805, 2020.
[115]
T. Wang, P. Wang, S. Cai, Y. Ma, A. Liu, and M. Xie, "A unified trustworthy environment establishment based on edge computing in industrial IoT", IEEE Trans. Industr. Inform., pp. 6083-6091, 2019.
[116]
S. Almajali, H. Salameh, M. Ayyash, and H. Elgala, "A framework for efficient and secured mobility of IoT devices in mobile edge computing", In 2018 Third International Conference On Fog And Mobile Edge Computing (FMEC), Barcelona, Spain 23-26 April,, 2018, pp. 58-62
[http://dx.doi.org/10.1109/FMEC.2018.8364045]
[117]
S. Rahman, and F. Shang, "A Review of Software Defined-Networking for Modern Technology and Signification", In Proceedings of 9th International Conference on Software and Information Engineering (ICSIE), 2020, pp. 47-50
[http://dx.doi.org/10.1145/3436829.3436874]
[118]
M.U. Younus, S. Islam, I. Ali, S. Khan, and M.K. Khan, "A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases", J. Netw. Comput. Appl., vol. 137, pp. 62-77, 2019.
[http://dx.doi.org/10.1016/j.jnca.2019.04.002]
[119]
D. Kreutz, F.M.V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky, and S. Uhlig, "Software-defined networking: A comprehensive survey", Proc. IEEE, vol. 103, no. 1, pp. 14-76, 2015.
[http://dx.doi.org/10.1109/JPROC.2014.2371999]
[120]
K.K. Karmakar, V. Varadharajan, S. Nepal, and U. Tupakula, "SDN-enabled secure IoT architecture", IEEE Int. Things J., vol. 8, no. 8, pp. 6549-6564, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3043740]
[121]
Y. Liu, Y. Kuang, Y. Xiao, and G. Xu, "SDN-based data transfer security for Internet of Things", IEEE Int. Things J., vol. 5, no. 1, pp. 257-268, 2018.
[http://dx.doi.org/10.1109/JIOT.2017.2779180]
[122]
S. Shirali-Shahreza, and Y. Ganjali, "Protecting home user devices with an SDN-based firewall", IEEE Trans. Consum. Electron., vol. 64, no. 1, pp. 92-100, 2018.
[http://dx.doi.org/10.1109/TCE.2018.2811261]
[123]
O. Salman, S. Abdallah, I. Elhajj, and A. Chehab, "Identity-based authentication scheme for the internet of things", In 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, Italy 27-30 June,, 2016, pp. 1109-1111
[http://dx.doi.org/10.1109/ISCC.2016.7543884]
[124]
Z. Han, X. Li, K. Huang, and Z. Feng, "A software defined network based security assessment framework for cloud IoT", IEEE Internet Things J., vol. 5, no. 3, pp. 1424-1434, 2018.
[http://dx.doi.org/10.1109/JIOT.2018.2801944]
[125]
P.K. Sharma, J.H. Park, Y.S. Jeong, and J.H. Park, "Shsec: SDN based secure smart home network architecture for internet of things", Mob. Netw. Appl., vol. 24, no. 3, pp. 913-924, 2019.
[http://dx.doi.org/10.1007/s11036-018-1147-3]
[126]
K. Kalkan, and S. Zeadally, "Securing internet of things with software defined networking", IEEE Commun. Mag., vol. 56, no. 9, pp. 186-192, 2018.
[http://dx.doi.org/10.1109/MCOM.2017.1700714]
[127]
Y. Meng, Z. Huang, G. Shen, and C. Ke, "SDN-based security enforcement framework for data sharing systems of smart healthcare", IEEE Trans. Netw. Serv. Manag., vol. 17, no. 1, pp. 308-318, 2020.
[http://dx.doi.org/10.1109/TNSM.2019.2941214]
[128]
W. Iqbal, H. Abbas, B. Rauf, Y. Abbas, F. Amjad, and A. Hemani, "PCSS: Privacy preserving communication scheme for SDN enabled smart homes", IEEE Sens. J., 2021.
[129]
W. Iqbal, H. Abbas, P. Deng, J. Wan, B. Rauf, Y. Abbas, and I. Rashid, "ALAM: Anonymous lightweight authentication mechanism for SDNenabled smart homes", IEEE Internet Things J., vol. 8, no. 12, pp. 9622-9633, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3024058]
[130]
A. Al Hayajneh, M. Bhuiyan, and I. McAndrew, "Improving internet of things (IoT) security with software-defined networking (SDN)", Computers, vol. 9, p. 8, 2020.
[131]
O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak, "A survey on boosting IoT security and privacy through blockchain", Cluster Comput., vol. 24, no. 1, pp. 37-55, 2021.
[http://dx.doi.org/10.1007/s10586-020-03137-8]
[132]
M. Alamri, N. Jhanjhi, and M. Humayun, Blockchain for Internet of Things (IoT) research issues challenges & future directions: A review Int. J. Comput. Sci. Net. Security, vol. Vol. 19, 2019..
[133]
F. Restuccia, S. Kanhere, T. Melodia, and S. Das, Blockchain for the internet of things: Present and future.. ArXiv, vol. 2019, 2019.
[134]
Y. Lu, "Blockchain and the related issues: a review of current research topics", J. Manag. Analyt., vol. 5, no. 4, pp. 231-255, 2018.
[http://dx.doi.org/10.1080/23270012.2018.1516523]
[135]
D. Fakhri, and K. Mutijarsa, "Secure IoT communication using blockchain technology", In 2018 International Symposium On Electronics And Smart Devices (ISESD), Bandung, Indonesia 23-24 Oct,, 2018, pp. 1-6
[136]
R. Di Pietro, X. Salleras, M. Signorini, and E. Waisbard, "A blockchain based trust system for the internet of things", In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018, pp. 77-83
[http://dx.doi.org/10.1145/3205977.3205993]
[137]
Y. Xu, G. Wang, J. Yang, J. Ren, Y. Zhang, and C. Zhang, "Towards secure network computing services for lightweight clients using blockchain", Wirel. Commun. Mob. Comput., vol. 2018, pp. 1-12, 2018.
[http://dx.doi.org/10.1155/2018/2051693]
[138]
Y. Qian, Y. Jiang, J. Chen, Y. Zhang, J. Song, M. Zhou, and M. Pustišek, "Towards decentralized IoT security enhancement: A blockchain approach", Comput. Electr. Eng., vol. 72, pp. 266-273, 2018.
[http://dx.doi.org/10.1016/j.compeleceng.2018.08.021]
[139]
D. Roy, P. Das, D. De, and R. Buyya, "QoS-aware secure transaction framework for internet of things using blockchain mechanism", J. Netw. Comput. Appl., pp. 59-78, 2019.
[140]
K. Kostall, and P. Helebrandt, "Management and monitoring of IoT devices using blockchain", Sensors , 2019.
[141]
O. Cheikhrouhou, "and A. Koub^aa, "Blockloc: Secure localization in the internet of things using blockchain", 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24-28 June, 2019",
[http://dx.doi.org/10.1109/IWCMC.2019.8766440]
[142]
G. Rathee, A. Sharma, H. Saini, R. Kumar, and R. Iqbal, "A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology", Multimedia Tools Appl., vol. 79, no. 15-16, pp. 9711-9733, 2020.
[http://dx.doi.org/10.1007/s11042-019-07835-3]
[143]
M.A. Al-Garadi, A. Mohamed, A.K. Al-Ali, X. Du, I. Ali, and M. Guizani, "A survey of machine and deep learning methods for internet of things (IoT) security", IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1646-1685, 2020.
[http://dx.doi.org/10.1109/COMST.2020.2988293]
[144]
M. Salam, Intelligent system for IoT botnet detection using SVM and PSO optimization J. Intell. Syst. Int. Things, p. 030203, 2021., .
[http://dx.doi.org/10.54216/JISIoT.030203]
[145]
S. Gautam, A. Henry, M. Zuhair, M. Rashid, A.R. Javed, and P.K.R. Maddikunta, "A composite approach of intrusion detection systems: Hybrid RNN and correlation-based feature optimization", Electronics , vol. 11, no. 21, p. 3529, 2022.
[http://dx.doi.org/10.3390/electronics11213529]
[146]
M. Bagaa, T. Taleb, J.B. Bernabe, and A. Skarmeta, "A machine learning security framework for IoT systems", IEEE Access, vol. 8, pp. 114066-114077, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2996214]
[147]
J. Zhang, and G. Qu, "Physical unclonable function-based key sharing via machine learning for IoT security", IEEE Trans. Ind. Electron., pp. 7025-7033, 2019.
[148]
J. Canedo, and A. Skjellum, "Using machine learning to secure IoT systems", In 14th Annual Conference on Privacy, Security and Trust (PST)Auckland, New Zealand 12-14 Dec, 2016.
[http://dx.doi.org/10.1109/PST.2016.7906930]
[149]
M. Bkassiny, Y. Li, and S. Jayaweera, "A survey on machine-learning techniques in cognitive radios", IEEE Commun. Surv. Tutor., pp. 1136-1159, 2012.
[150]
G. Han, L. Xiao, and H. Poor, "Two-dimensional anti-jamming communication based on deep reinforcement learning", In 2017 IEEE International Conference On Acoustics, Speech And Signal Processing (ICASSP), New Orleans, LA, USA 05-09 Mar, , 2017, pp. 2087-2091
[http://dx.doi.org/10.1109/ICASSP.2017.7952524]
[151]
R. Doshi, N. Apthorpe, and N. Feamster, Machine learning DDoS detection for consumer internet of things devices IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24-24 May, 2018, pp. 29-35, .
[152]
H. Yao, P. Gao, J. Wang, P. Zhang, C. Jiang, and Z. Han, "Capsule network assisted IoT traffic classification mechanism for smart cities", IEEE Int. Things J., vol. 6, no. 5, pp. 7515-7525, 2019.
[http://dx.doi.org/10.1109/JIOT.2019.2901348]
[153]
S. Liu, M. Dibaei, Y. Tai, C. Chen, J. Zhang, and Y. Xiang, Cyber vulnerability intelligence for Internet of Things binary., IEEE Transac. Indust. Inform, pp. 2154-2163. 2019
[154]
M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city ", Fut. Generation Comput. Syst., vol. 107, p. 017, 2020., .
[http://dx.doi.org/10.1016/j.future.2020.02.017]
[155]
M. Shafiq, Z. Tian, A.K. Bashir, X. Du, and M. Guizani, "CorrAUC: A malicious bot-iot traffic detection method in iot network using machine-learning techniques", IEEE Int. Things J., vol. 8, no. 5, pp. 3242-3254, 2021.
[http://dx.doi.org/10.1109/JIOT.2020.3002255]
[156]
A. Sarker, A.C. Canto, M. Mozaffari Kermani, and R. Azarderakhsh, "Error detection architectures for hardware/software co-design approaches of number-theoretic transform", IEEE Trans. Comput. Aided Des. Integrated Circ. Syst., vol. 42, no. 7, pp. 2418-2422, 2023.
[http://dx.doi.org/10.1109/TCAD.2022.3218614]
[157]
M. Mozaffari-Kermani, Reliable and high-performance hardware architectures for the Advanced Encryption Standard/Galois Counter Mode Diss. The University of Western Ontario (Canada).,, 2011.
[158]
A. Sarker, M. Mozaffari Kermani, and R. Azarderakhsh, "Efficient error detection architectures for postquantum signature falcon’s sampler and KEM SABER", Systems, vol. 30, no. 6, pp. 794-802, 2022.
[159]
A.C. Canto, J. Kaur, M.M. Kermani, and R. Azarderakhsh, Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security ", arXiv, vol. 2023, 2023.
[160]
S. Ali, X. Guo, R. Karri, and D. Mukhopadhyay, Fault Attacks on AES and Their Countermeasures ", In: M. Potkonjak, Ed., Secure System Design and Trustable Computing. Springer, 2016.. Chang, CH, 2016.
[http://dx.doi.org/10.1007/978-3-319-14971-4_5]
[161]
E. Dubrova, K. Ngo, J. Gärtner, and R. Wang, "Breaking a fifth-order masked implementation of crystals-kyber by copy-paste", In Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop (APKC ’23), New York, NY, USA, 2023.
[http://dx.doi.org/ 10.1145/3591866.3593072]
[162]
J. Kaur, A.C. Canto, M.M. Kermani, and R. Azarderakhsh, "A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard ", arXiv, vol. 2023, 2023.
[163]
R. Elkhatib, R. Azarderakhsh, and M. Mozaffari-Kermani, "Accelerated RISC-V for SIKE IEEE 28th Symposium on Computer Arithmetic (ARITH), Lyngby, Denmark, 14-16 June, 2021",
[http://dx.doi.org/10.1109/ARITH51176.2021.00035]
[164]
A. Cintas-Canto, J. Kaur, M. Mozaffari-Kermani, and R. Azarderakhsh, ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ”, ASCON", arXiv, vol. 2023,, 2023.
[165]
S. Hanke, C. Mayer, O. Hoeftberger, H. Boos, R. Wichert, and M.R. Tazari, UniversAAL–an open and consolidated AAL platform., Ambient Assisted Living, 2011.
[166]
P. Wolf, A. Schmidt, and M. Klein, "SOPRANO-An extensible, open AAL platform for elderly people based on semantical contracts", In 18th European Conference on Artificial Intelligence (ECAI 08) 2008 Patras, Greece 2008
[167]
P. Antón, A. Muñoz, and A. Maña, Security-enhanced ambient assisted living supporting school activities during hospitalisation J. Ambient Intell. Human Comput., p. 6, 2012..
[http://dx.doi.org/10.1007/s12652-010-0039-6]
[168]
F. Büsching, M. Bottazzi, and L. Wolf, "The GAL monitoring concept for distributed AAL platforms IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), Beijing, China, 10-13 Oct, 2012",
[http://dx.doi.org/10.1109/HealthCom.2012.6379463]
[169]
A. Costa, A. Yelshyna, T.C. Moreira, F.C.P. Andrade, V. Julián, and P. Novais, "A legal framework for an elderly healthcare platform: A privacy and data protection overview", Comput. Law Secur. Rep., vol. 33, no. 5, pp. 647-658, 2017.
[http://dx.doi.org/10.1016/j.clsr.2017.03.021]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy