Internet-of-Things Data Security: Challenges, Countermeasures and Opportunities

Farag Azzedin, Ibraheem Al-Hejri

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Internet of Things (IoT) has introduced a revolutionary paradigm that unleashes multitude of functionalities and possibilities. Currently, IoT and its extensive range of applications have become the focal point of numerous research endeavors. While the inherent characteristics of IoT make it highly adaptable to real-world scenarios, they also expose it to potential cybersecurity risks. IoT has experienced an unprecedented number of cyberattacks, which not only affect businesses but also pose potential risks to human lives. Therefore, it is crucial to establish a comprehensive classification of IoT challenges and identify the available countermeasures. In this paper, we conduct an extensive survey on IoT security challenges and countermeasures, and propose a taxonomy to categorize them based on the three data states. Furthermore, we discuss future directions towards IoT data security.

Original languageEnglish
Title of host publicationICFNDS 2023 - 2023 The 7th International Conference on Future Networks and Distributed Systems
PublisherAssociation for Computing Machinery
Pages633-640
Number of pages8
ISBN (Electronic)9798400709036
DOIs
StatePublished - 21 Dec 2023
Event7th International Conference on Future Networks and Distributed Systems, ICFNDS 2023 - Dubai, United Arab Emirates
Duration: 21 Dec 202322 Dec 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th International Conference on Future Networks and Distributed Systems, ICFNDS 2023
Country/TerritoryUnited Arab Emirates
CityDubai
Period21/12/2322/12/23

Bibliographical note

Publisher Copyright:
© 2023 ACM.

Keywords

  • Challenges
  • Countermeasures
  • Data at rest
  • Data in transit
  • Data in use
  • Data Security
  • IoT
  • Survey
  • Taxonomy

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint

Dive into the research topics of 'Internet-of-Things Data Security: Challenges, Countermeasures and Opportunities'. Together they form a unique fingerprint.

Cite this