A survey on internet of things security from data perspectives

As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understandin...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2019-01, Vol.148, p.295-306
Hauptverfasser: Hou, Jianwei, Qu, Leilei, Shi, Wenchang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 306
container_issue
container_start_page 295
container_title Computer networks (Amsterdam, Netherlands : 1999)
container_volume 148
creator Hou, Jianwei
Qu, Leilei
Shi, Wenchang
description As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.
doi_str_mv 10.1016/j.comnet.2018.11.026
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2190998769</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128618306844</els_id><sourcerecordid>2190998769</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYMouK5-Aw8Bz62ZJG2Sy8Ii_oMFL3oObZpqitvUJF3Yb2-WevY0c3jvN_MeQrdASiBQ3w-l8fvRppISkCVASWh9hlYgBS0EqdV53plUBVBZX6KrGAdCCOdUrtBmi-McDvaI_YjdmGzIHOx7nL7c-BlxtGYOLh1xH_wed01q8GRDnKxJ7mDjNbrom-9ob_7mGn08Pb4_vBS7t-fXh-2uMEzRVPBK5T-BC9IKpqSwnDOo6h4UY9ByAq3oGuhN31ZC0Y5QblvWiaqujDSScLZGdwt3Cv5ntjHpwc9hzCc1BUVUZtYqq_iiMsHHGGyvp-D2TThqIPrUlB700pQ-NaUBdG4q2zaLzeYEB2eDjsbZ0djOhZxTd979D_gFsgJyGg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2190998769</pqid></control><display><type>article</type><title>A survey on internet of things security from data perspectives</title><source>Elsevier ScienceDirect Journals</source><creator>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</creator><creatorcontrib>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</creatorcontrib><description>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2018.11.026</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Access control ; Authentication ; Cybersecurity ; Forensics ; Internet of Things ; Privacy ; Safety ; Security</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2019-01, Vol.148, p.295-306</ispartof><rights>2018</rights><rights>Copyright Elsevier Sequoia S.A. Jan 15, 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</citedby><cites>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S1389128618306844$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Hou, Jianwei</creatorcontrib><creatorcontrib>Qu, Leilei</creatorcontrib><creatorcontrib>Shi, Wenchang</creatorcontrib><title>A survey on internet of things security from data perspectives</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</description><subject>Access control</subject><subject>Authentication</subject><subject>Cybersecurity</subject><subject>Forensics</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Safety</subject><subject>Security</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LxDAQxYMouK5-Aw8Bz62ZJG2Sy8Ii_oMFL3oObZpqitvUJF3Yb2-WevY0c3jvN_MeQrdASiBQ3w-l8fvRppISkCVASWh9hlYgBS0EqdV53plUBVBZX6KrGAdCCOdUrtBmi-McDvaI_YjdmGzIHOx7nL7c-BlxtGYOLh1xH_wed01q8GRDnKxJ7mDjNbrom-9ob_7mGn08Pb4_vBS7t-fXh-2uMEzRVPBK5T-BC9IKpqSwnDOo6h4UY9ByAq3oGuhN31ZC0Y5QblvWiaqujDSScLZGdwt3Cv5ntjHpwc9hzCc1BUVUZtYqq_iiMsHHGGyvp-D2TThqIPrUlB700pQ-NaUBdG4q2zaLzeYEB2eDjsbZ0djOhZxTd979D_gFsgJyGg</recordid><startdate>20190115</startdate><enddate>20190115</enddate><creator>Hou, Jianwei</creator><creator>Qu, Leilei</creator><creator>Shi, Wenchang</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20190115</creationdate><title>A survey on internet of things security from data perspectives</title><author>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Cybersecurity</topic><topic>Forensics</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Safety</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hou, Jianwei</creatorcontrib><creatorcontrib>Qu, Leilei</creatorcontrib><creatorcontrib>Shi, Wenchang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hou, Jianwei</au><au>Qu, Leilei</au><au>Shi, Wenchang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey on internet of things security from data perspectives</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2019-01-15</date><risdate>2019</risdate><volume>148</volume><spage>295</spage><epage>306</epage><pages>295-306</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2018.11.026</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1389-1286
ispartof Computer networks (Amsterdam, Netherlands : 1999), 2019-01, Vol.148, p.295-306
issn 1389-1286
1872-7069
language eng
recordid cdi_proquest_journals_2190998769
source Elsevier ScienceDirect Journals
subjects Access control
Authentication
Cybersecurity
Forensics
Internet of Things
Privacy
Safety
Security
title A survey on internet of things security from data perspectives
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A08%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20on%20internet%20of%20things%20security%20from%20data%20perspectives&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Hou,%20Jianwei&rft.date=2019-01-15&rft.volume=148&rft.spage=295&rft.epage=306&rft.pages=295-306&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2018.11.026&rft_dat=%3Cproquest_cross%3E2190998769%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2190998769&rft_id=info:pmid/&rft_els_id=S1389128618306844&rfr_iscdi=true