Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
 
review article

A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

Pourrahmani, Hossein  
•
Yavarinasab, Adel
•
Monazzah, Amir Mahdi Hosseini
Show more
October 1, 2023
Internet Of Things

The current advances in the Internet of Things (IoT) and the solutions being offered by this technology have accounted IoT among the top ten technologies that will transform the global economy by 2030. IoT is a state-of-the-art paradigm that has developed traditional living into a high-tech lifestyle. The current study aims to provide a comprehensive review and analysis of the existing cybersecurity attacks and vulnerabilities in IoT, offering suitable countermeasures with a focus on describing the impact of emerging technologies on IoT devices and protocol layers. The main vulnerabilities across different layers of the IoT reference model are discussed and categorized, and suitable countermeasures (such as separating IT and IoT network traffic, enhancing physical security, implementing encryption and secure messaging protocols, etc.) are suggested. In addition, the hardware, communication, application, web, and cloud vul-nerabilities are introduced, then the corresponding safeguards and protections are presented. Furthermore, Information Assurance (IA) has been deliberately defined and the adoption of the NIST framework and IA model is recommended as a metric to ensure security for IoT solutions considering the five pillars of availability, integrity, authentication, confidentiality, and non -repudiation. Finally, Blockchain technology, known for its use in securing cryptocurrencies, is suggested to facilitate secure data exchange, identification, authentication, and communication for IoT devices by various avenues including ensuring the integrity of sensor data, eliminating the need for intermediaries, reducing costs, and enabling direct addressability of IoT devices.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

1-s2.0-S2542660523002111-main.pdf

Type

Publisher

Version

http://purl.org/coar/version/c_970fb48d4fbd8a85

Access type

openaccess

License Condition

CC BY-NC-ND

Size

3.35 MB

Format

Adobe PDF

Checksum (MD5)

4f24c37cb8c991b17957281632f86358

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés