Next Article in Journal
An Infrared Defect Sizing Method Based on Enhanced Phase Images
Previous Article in Journal
Motion Detection Using Tactile Sensors Based on Pressure-Sensitive Transistor Arrays
Previous Article in Special Issue
A Multi-Objective Approach for Optimal Energy Management in Smart Home Using the Reinforcement Learning
Open AccessReview

A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis

Department of IT, College of Computing and Informatics, Saudi Electronic University, Medina 42376, Saudi Arabia
SERCOM-Lab., Tunisia Polytechnic School, Carthage University, Tunis 1054, Tunisia
School of Science, Engineering and Environment, University of Salford, Manchester M5 4WT, UK
Department of Science, College of Science and Theoretical Studies, Saudi Electronic University, Riyadh 11673, Saudi Arabia
INSAT, SERCOM-Lab., Tunisia Polytechnic School, Carthage University, 1080 Tunis, Tunisia
Author to whom correspondence should be addressed.
Sensors 2020, 20(13), 3625;
Received: 29 May 2020 / Revised: 20 June 2020 / Accepted: 23 June 2020 / Published: 28 June 2020
(This article belongs to the Special Issue Sensing and Data Analysis Techniques for Intelligent Healthcare)
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond. View Full-Text
Keywords: wearable and non-wearable devices; IoT; communication protocol; security attacks and countermeasures; data analysis wearable and non-wearable devices; IoT; communication protocol; security attacks and countermeasures; data analysis
Show Figures

Figure 1

MDPI and ACS Style

Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop