Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting technology.IoT security concerns are still a substantial concern despite its extraordinary advantages.This paper o...Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting technology.IoT security concerns are still a substantial concern despite its extraordinary advantages.This paper offers an extensive review of IoT security,emphasizing the technology’s architecture,important security elements,and common attacks.It highlights how important artificial intelligence(AI)is to bolstering IoT security,especially when it comes to addressing risks at different IoT architecture layers.We systematically examined current mitigation strategies and their effectiveness,highlighting contemporary challenges with practical solutions and case studies from a range of industries,such as healthcare,smart homes,and industrial IoT.Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability.IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities.This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT,security challenges,and AI-driven solutions.展开更多
Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained res...Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained resources and the backbone network. Numerous researchers have put a lot of effort into addressing routing protocol security vulnerabilities, particularly regarding IoT RPL-based networks. Despite multiple studies on the security of IoT routing protocols, routing attacks remain a major focus of ongoing research in IoT contexts. This paper examines the different types of routing attacks, how they affect Internet of Things networks, and how to mitigate them. Then, it provides an overview of recently published work on routing threats, primarily focusing on countermeasures, highlighting noteworthy security contributions, and drawing conclusions. Consequently, it achieves the study’s main objectives by summarizing intriguing current research trends in IoT routing security, pointing out knowledge gaps in this field, and suggesting directions and recommendations for future research on IoT routing security.展开更多
The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This surve...The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This survey systematically reviews the vulnerabilities in token transmission within IoT environments,focusing on various sophisticated attack vectors such as replay attacks,token hijacking,man-in-the-middle(MITM)attacks,token injection,and eavesdropping among others.These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth,JSON Web Tokens(JWT),and bearer tokens,which are widely used in IoT ecosystems for managing device interactions and access control.The impact of such attacks is profound,leading to unauthorized access,data exfiltration,and control over IoT devices,posing significant threats to privacy,safety,and the operational integrity of critical IoT applications in sectors like healthcare,smart cities,and industrial automation.This paper categorizes these attack vectors,explores real-world case studies,and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory,rendering them more susceptible to such exploits.Furthermore,this survey presents a comprehensive evaluation of existing mitigation techniques,including cryptographic protocols,lightweight secure transmission frameworks,secure token management practices,and network-layer defenses such as Transport Layer Security(TLS)and multi-factor authentication(MFA).The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research,emphasizing the need for more scalable,energy-efficient,and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices.展开更多
In the last ten years,the IoT has played a crucial role in society's digital transformation.However,because of the wide range of devices it encompasses,it is also facing increased security vulnerabilities.This res...In the last ten years,the IoT has played a crucial role in society's digital transformation.However,because of the wide range of devices it encompasses,it is also facing increased security vulnerabilities.This research presents a novel mechanism called the self-attention-based 1D-CNN-LSTM,which uses convolutional neural networks(CNNs)combined with a long short-term memory(LSTM)model enhanced with a self-attention mechanism for detecting IoT attacks.The proposed mechanism achieves high accuracy and efficiently differentiates malicious and benign network traffic.By employing Shapley additive explanations(SHAP),we identified important predictive features from the preprocessed data,which were retrieved using CICFlowMeter.This has strengthened the dependability of the model.In addition,we enhanced the model by training it on a smaller collection of features,resulting in shorter training time while preserving accuracy.We have also generated nine augmented IoT tabular datasets named CIC-BCCCNRC_TabularIoTAttack-2024 from accessible IoT datasets to evaluate the model's robustness and showcase its efficacy in IoT security.展开更多
The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on character...The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on characterizing the many edges and technologies that make up an IoT system, the IoT ecosystem is still seen as too complex to be recognized as a stand-alone environment due to its significant diversity;hence, the objective of this research is to address such a complex environment in a way that highlights its components and distinguishes them both individually and in relation to their broader context. Therefore, the definition of IoT and its emergence were discussed and organized around the timeline of Internet development phases demonstrating that IoT has been a need that has accompanied the presence of the Internet since its early stages, and then its growth and impact were discussed and highlighted with estimates and numbers. On the technical side, each of the following groups, IoT components, protocols, and architectures, was defined, discussed, and grouped in such a way that their intergroup organization, as well as their placement and contribution to the overall ecosystem, was highlighted. This, in addition to the various examples mentioned throughout the discussion, will provide the reader with a better understanding of the Internet of Things and how deeply it has become entwined in our daily lives and routines as a result of its numerous applications.展开更多
文摘Enhancing the interconnection of devices and systems,the Internet of Things(IoT)is a paradigm-shifting technology.IoT security concerns are still a substantial concern despite its extraordinary advantages.This paper offers an extensive review of IoT security,emphasizing the technology’s architecture,important security elements,and common attacks.It highlights how important artificial intelligence(AI)is to bolstering IoT security,especially when it comes to addressing risks at different IoT architecture layers.We systematically examined current mitigation strategies and their effectiveness,highlighting contemporary challenges with practical solutions and case studies from a range of industries,such as healthcare,smart homes,and industrial IoT.Our results highlight the importance of AI methods that are lightweight and improve security without compromising the limited resources of devices and computational capability.IoT networks can ensure operational efficiency and resilience by proactively identifying and countering security risks by utilizing machine learning capabilities.This study provides a comprehensive guide for practitioners and researchers aiming to understand the intricate connection between IoT,security challenges,and AI-driven solutions.
文摘Today’s Internet of Things (IoT) application domains are widely distributed, which exposes them to several security risks and assaults, especially when data is being transferred between endpoints with constrained resources and the backbone network. Numerous researchers have put a lot of effort into addressing routing protocol security vulnerabilities, particularly regarding IoT RPL-based networks. Despite multiple studies on the security of IoT routing protocols, routing attacks remain a major focus of ongoing research in IoT contexts. This paper examines the different types of routing attacks, how they affect Internet of Things networks, and how to mitigate them. Then, it provides an overview of recently published work on routing threats, primarily focusing on countermeasures, highlighting noteworthy security contributions, and drawing conclusions. Consequently, it achieves the study’s main objectives by summarizing intriguing current research trends in IoT routing security, pointing out knowledge gaps in this field, and suggesting directions and recommendations for future research on IoT routing security.
文摘The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This survey systematically reviews the vulnerabilities in token transmission within IoT environments,focusing on various sophisticated attack vectors such as replay attacks,token hijacking,man-in-the-middle(MITM)attacks,token injection,and eavesdropping among others.These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth,JSON Web Tokens(JWT),and bearer tokens,which are widely used in IoT ecosystems for managing device interactions and access control.The impact of such attacks is profound,leading to unauthorized access,data exfiltration,and control over IoT devices,posing significant threats to privacy,safety,and the operational integrity of critical IoT applications in sectors like healthcare,smart cities,and industrial automation.This paper categorizes these attack vectors,explores real-world case studies,and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory,rendering them more susceptible to such exploits.Furthermore,this survey presents a comprehensive evaluation of existing mitigation techniques,including cryptographic protocols,lightweight secure transmission frameworks,secure token management practices,and network-layer defenses such as Transport Layer Security(TLS)and multi-factor authentication(MFA).The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research,emphasizing the need for more scalable,energy-efficient,and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices.
基金supported in part by collaborative research funding from the National Research Council of Canada’s Artificial Intelligence for Logistics Program.
文摘In the last ten years,the IoT has played a crucial role in society's digital transformation.However,because of the wide range of devices it encompasses,it is also facing increased security vulnerabilities.This research presents a novel mechanism called the self-attention-based 1D-CNN-LSTM,which uses convolutional neural networks(CNNs)combined with a long short-term memory(LSTM)model enhanced with a self-attention mechanism for detecting IoT attacks.The proposed mechanism achieves high accuracy and efficiently differentiates malicious and benign network traffic.By employing Shapley additive explanations(SHAP),we identified important predictive features from the preprocessed data,which were retrieved using CICFlowMeter.This has strengthened the dependability of the model.In addition,we enhanced the model by training it on a smaller collection of features,resulting in shorter training time while preserving accuracy.We have also generated nine augmented IoT tabular datasets named CIC-BCCCNRC_TabularIoTAttack-2024 from accessible IoT datasets to evaluate the model's robustness and showcase its efficacy in IoT security.
文摘The Internet of Things (IoT) is a technological revolution that has changed everything we do and given us a new perspective on our daily lives, but despite the fact that numerous publications have focused on characterizing the many edges and technologies that make up an IoT system, the IoT ecosystem is still seen as too complex to be recognized as a stand-alone environment due to its significant diversity;hence, the objective of this research is to address such a complex environment in a way that highlights its components and distinguishes them both individually and in relation to their broader context. Therefore, the definition of IoT and its emergence were discussed and organized around the timeline of Internet development phases demonstrating that IoT has been a need that has accompanied the presence of the Internet since its early stages, and then its growth and impact were discussed and highlighted with estimates and numbers. On the technical side, each of the following groups, IoT components, protocols, and architectures, was defined, discussed, and grouped in such a way that their intergroup organization, as well as their placement and contribution to the overall ecosystem, was highlighted. This, in addition to the various examples mentioned throughout the discussion, will provide the reader with a better understanding of the Internet of Things and how deeply it has become entwined in our daily lives and routines as a result of its numerous applications.