A survey on internet of things security from data perspectives
As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understandin...
Gespeichert in:
Veröffentlicht in: | Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2019-01, Vol.148, p.295-306 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 306 |
---|---|
container_issue | |
container_start_page | 295 |
container_title | Computer networks (Amsterdam, Netherlands : 1999) |
container_volume | 148 |
creator | Hou, Jianwei Qu, Leilei Shi, Wenchang |
description | As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security. |
doi_str_mv | 10.1016/j.comnet.2018.11.026 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2190998769</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128618306844</els_id><sourcerecordid>2190998769</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</originalsourceid><addsrcrecordid>eNp9kE9LxDAQxYMouK5-Aw8Bz62ZJG2Sy8Ii_oMFL3oObZpqitvUJF3Yb2-WevY0c3jvN_MeQrdASiBQ3w-l8fvRppISkCVASWh9hlYgBS0EqdV53plUBVBZX6KrGAdCCOdUrtBmi-McDvaI_YjdmGzIHOx7nL7c-BlxtGYOLh1xH_wed01q8GRDnKxJ7mDjNbrom-9ob_7mGn08Pb4_vBS7t-fXh-2uMEzRVPBK5T-BC9IKpqSwnDOo6h4UY9ByAq3oGuhN31ZC0Y5QblvWiaqujDSScLZGdwt3Cv5ntjHpwc9hzCc1BUVUZtYqq_iiMsHHGGyvp-D2TThqIPrUlB700pQ-NaUBdG4q2zaLzeYEB2eDjsbZ0djOhZxTd979D_gFsgJyGg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2190998769</pqid></control><display><type>article</type><title>A survey on internet of things security from data perspectives</title><source>Elsevier ScienceDirect Journals</source><creator>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</creator><creatorcontrib>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</creatorcontrib><description>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2018.11.026</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Access control ; Authentication ; Cybersecurity ; Forensics ; Internet of Things ; Privacy ; Safety ; Security</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2019-01, Vol.148, p.295-306</ispartof><rights>2018</rights><rights>Copyright Elsevier Sequoia S.A. Jan 15, 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</citedby><cites>FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S1389128618306844$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Hou, Jianwei</creatorcontrib><creatorcontrib>Qu, Leilei</creatorcontrib><creatorcontrib>Shi, Wenchang</creatorcontrib><title>A survey on internet of things security from data perspectives</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</description><subject>Access control</subject><subject>Authentication</subject><subject>Cybersecurity</subject><subject>Forensics</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Safety</subject><subject>Security</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNp9kE9LxDAQxYMouK5-Aw8Bz62ZJG2Sy8Ii_oMFL3oObZpqitvUJF3Yb2-WevY0c3jvN_MeQrdASiBQ3w-l8fvRppISkCVASWh9hlYgBS0EqdV53plUBVBZX6KrGAdCCOdUrtBmi-McDvaI_YjdmGzIHOx7nL7c-BlxtGYOLh1xH_wed01q8GRDnKxJ7mDjNbrom-9ob_7mGn08Pb4_vBS7t-fXh-2uMEzRVPBK5T-BC9IKpqSwnDOo6h4UY9ByAq3oGuhN31ZC0Y5QblvWiaqujDSScLZGdwt3Cv5ntjHpwc9hzCc1BUVUZtYqq_iiMsHHGGyvp-D2TThqIPrUlB700pQ-NaUBdG4q2zaLzeYEB2eDjsbZ0djOhZxTd979D_gFsgJyGg</recordid><startdate>20190115</startdate><enddate>20190115</enddate><creator>Hou, Jianwei</creator><creator>Qu, Leilei</creator><creator>Shi, Wenchang</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20190115</creationdate><title>A survey on internet of things security from data perspectives</title><author>Hou, Jianwei ; Qu, Leilei ; Shi, Wenchang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-4590161470b73987e443156f19331b401b7da1fcfb5792d024eb3d7565c8c8043</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Cybersecurity</topic><topic>Forensics</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Safety</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hou, Jianwei</creatorcontrib><creatorcontrib>Qu, Leilei</creatorcontrib><creatorcontrib>Shi, Wenchang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hou, Jianwei</au><au>Qu, Leilei</au><au>Shi, Wenchang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey on internet of things security from data perspectives</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2019-01-15</date><risdate>2019</risdate><volume>148</volume><spage>295</spage><epage>306</epage><pages>295-306</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>As the Internet of Things (IoT) sees an increasing use in the society, the security challenge it faces is becoming more and more severe. Data collected and shared in the IoT plays an important role in the significance of the IoT. Observing from a data perspective may be of great help in understanding IoT security. Though a number of surveys on IoT security have been out there, none of them is from such a perspective. To fill the gap, this paper investigates IoT security from data perspectives. Combining the concept of typical IoT architectures with data life cycles, the paper proposes a three-dimensional approach to exploring IoT security, i.e., with the one-stop, multi-stop and end-application dimensions. The one-stop dimension explores IoT security by observing data on an IoT device, the multi-stop dimension by observing data among a group of IoT entities, and the end-application dimension by observing data used in IoT applications. While data may flow from IoT end-point devices through the Internet to a cloud or vice versa, the most demanding IoT-specific issues are in the space from IoT end-point devices to the border of the Internet, therefore the paper focuses on this space. The one-stop dimension discusses IoT security with respect to data that may flow from and to an end-point device. The multi-stop dimension works from the angle of data among a group of IoT entities, concerning secure communication, authentication and access control. The end-application dimension acts from the viewpoint of data usage in IoT applications, covering privacy, forensics, and social or legal challenges of the entire system. The paper makes an in-depth analysis of the latest development in IoT security by observing from data perspectives, summarizing open issues and suggesting promising directions for further research and applications of IoT security.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2018.11.026</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1389-1286 |
ispartof | Computer networks (Amsterdam, Netherlands : 1999), 2019-01, Vol.148, p.295-306 |
issn | 1389-1286 1872-7069 |
language | eng |
recordid | cdi_proquest_journals_2190998769 |
source | Elsevier ScienceDirect Journals |
subjects | Access control Authentication Cybersecurity Forensics Internet of Things Privacy Safety Security |
title | A survey on internet of things security from data perspectives |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A08%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20on%20internet%20of%20things%20security%20from%20data%20perspectives&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Hou,%20Jianwei&rft.date=2019-01-15&rft.volume=148&rft.spage=295&rft.epage=306&rft.pages=295-306&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2018.11.026&rft_dat=%3Cproquest_cross%3E2190998769%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2190998769&rft_id=info:pmid/&rft_els_id=S1389128618306844&rfr_iscdi=true |