Next Article in Journal
GeoQoE-Vanet: QoE-Aware Geographic Routing Protocol for Video Streaming over Vehicular Ad-hoc Networks
Previous Article in Journal
Performance Evaluation of 5G Access Technologies and SDN Transport Network on an NS3 Simulator
Previous Article in Special Issue
Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN)
Open AccessArticle

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

1
Center for Cybercrime Studies, CUNY-John Jay College of Criminal Justice, New York, NY 10019, USA
2
Computer Science and Network Engineering, Bloomfield College, Bloomfield, NJ 07003, USA
3
Department of Computer Science, CUNY-John Jay College of Criminal Justice, New York, NY 10019, USA
4
Professional Security Studies, New Jersey City University, Jersey City, NJ 07305, USA
*
Author to whom correspondence should be addressed.
Computers 2020, 9(2), 44; https://doi.org/10.3390/computers9020044
Received: 10 May 2020 / Revised: 25 May 2020 / Accepted: 27 May 2020 / Published: 30 May 2020
(This article belongs to the Special Issue IoT: Security, Privacy and Best Practices)
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem. View Full-Text
Keywords: security; privacy; cyber-attack; threat; mitigations; risk; cryptography; vulnerability; intrusion; encryption-key security; privacy; cyber-attack; threat; mitigations; risk; cryptography; vulnerability; intrusion; encryption-key
Show Figures

Figure 1

MDPI and ACS Style

Obaidat, M.A.; Obeidat, S.; Holst, J.; Al Hayajneh, A.; Brown, J. A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers 2020, 9, 44.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop