Cyber SecurityApproaches and Trends in Internet of Things: Systematic Literature Review and Unwrapped Issues

  • Ali Aizaz
  • Aurangzaib Ali
Keywords: Internet of Things, Cyber Security, Cyber-attacks, Cyber Policies, diversities, frameworks, authentication, algorithms, and unwrapped.

Abstract

Currently, the revolution in Internet of Things (IoT) has immensely been witnessed since the last decade. Internet of
things is based on diverse devices that consist on sensors, actuators, devices, and other technologies. The goal is to use the
internet to connect and share data with other devices and systems. Internet of Things and Cyber Security are the fastest growing
buzzwords that have a deeprelation to each other. The revolution in IoT enhances cybercrimes which maliciously affect critical
and confidential information.Therefore, there is a dire need for essential cybersecurity approaches and algorithms to secure the
exchange of data between IoT devices over the internet. In this paper, we have conducted a systematic literature review of
current trends and approaches that are essential for securing IoT. Furthermore, we have founded widely popular cybercrimes
that distort the performance of IoT such as; Denial of service attacks, routing attacks, viruses, malicious open-source software,
external interruption, malicious code injection, and email fraud. In addition to this, we have presented existing effective
solutions and recommendations for effective Cybersecurity in IoT including; Ghost European framework, Block chain
technology, layers-based security, societal model, secure authentication, and various machine learning algorithms. Finally, we
have also addressed some unwrapped issues for future scholars and this SLR will play an essential role for the researchers who
engage in the research of IoT and Cybersecurity

References

[1]. Augusto-Gonzalez, J., et al. From internet of threats to internet of things: A cyber security architecture for smart homes, IEEE.2019
[2]. Faisal, M., et al. (2020). "Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges."
Complexity 2020.
[3]. Tsunoda, H. and G. M. Keeni Feasibility of societal model for securing Internet of Things, IEEE.2017.
[4]. Rohit, M. H., et al. Mitigating and Detecting DDoS attack on IoT Environment, IEEE.2019..
[5]. Hossain, M., et al. Securing the internet of things: A meta-study of challenges, approaches, and open problems, IEEE.2017.
[6]. Tonge, A. M., et al. (2013). "Cyber security: challenges for society-literature review." IOSR Journal of computer Engineering 12(2): 67-75.
[7]. Taheri, S., et al. Multi-Source Cyber-Attacks Detection using Machine Learning, IEEE.2019.
[8]. Ullah, F., et al. (2019). "Cyber security threats detection in internet of things using deep learning approach." IEEE Access 7: 124379-124389.
[9]. Kang, C.-q., et al. Cyber Security Risk Analysis and Protection Structure Design for Power Distribution IoT, IEEE.2020
[10]. Shafiq, M., et al. (2020). "Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things
in smart city." Future Generation Computer Systems 107: 433-442
Published
2023-11-22
How to Cite
Aizaz, A., & Ali, A. (2023). Cyber SecurityApproaches and Trends in Internet of Things: Systematic Literature Review and Unwrapped Issues. Journal of Software Engineering, 2(1), 29-40. Retrieved from http://sjhse.smiu.edu.pk/sjhse/index.php/SJHSE/article/view/55