Next Article in Journal
SDN-Based Routing for Backhauling in Ultra-Dense Networks
Next Article in Special Issue
OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections
Previous Article in Journal
Utilization of a Non-Linear Error Function in a Positioning Algorithm for Distance Measurement Systems Designed for Indoor Environments
Previous Article in Special Issue
A Mechanism for Securing IoT-enabled Applications at the Fog Layer
Open AccessArticle

A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective

Geneva School of Economics and Management, Geneva University, 1211 Geneva, Switzerland
*
Author to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2019, 8(2), 22; https://doi.org/10.3390/jsan8020022
Received: 14 February 2019 / Revised: 9 April 2019 / Accepted: 9 April 2019 / Published: 22 April 2019
(This article belongs to the Special Issue Sensors and Actuators: Security Threats and Countermeasures)
As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the existence of IoT. They derive from two main reasons. One is that IoT objects are equipped with limited capabilities in terms of computation power, memory, and bandwidth which hamper the direct implementation of traditional Internet security techniques. The other reason is the absence of widely-accepted IoT security and privacy guidelines and their appropriate implementation techniques. Such guidelines and techniques would greatly assist IoT stakeholders like developers and manufacturers, paving the road for building secure IoT systems from the start and, thus, reinforcing IoT security and privacy by design. In order to contribute to such objective, we first briefly discuss the primary IoT security goals and recognize IoT stakeholders. Second, we propose a comprehensive list of IoT security and privacy guidelines for the edge nodes and communication levels of IoT reference architecture. Furthermore, we point out the IoT stakeholders such as customers and manufacturers who will benefit most from these guidelines. Moreover, we identify a set of implementation techniques by which such guidelines can be accomplished, and possible attacks against previously-mentioned levels can be alleviated. Third, we discuss the challenges of IoT security and privacy guidelines, and we briefly discuss digital rights management in IoT. Finally, through this survey, we suggest several open issues that require further investigation in the future. To the best of the authors’ knowledge, this work is the first survey that covers the above-mentioned objectives. View Full-Text
Keywords: Internet of Things; security guidelines; privacy guidelines; countermeasures; security goals; attacks Internet of Things; security guidelines; privacy guidelines; countermeasures; security goals; attacks
Show Figures

Figure 1

MDPI and ACS Style

Abdul-Ghani, H.A.; Konstantas, D. A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective. J. Sens. Actuator Netw. 2019, 8, 22.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop