Towards The Secure Internet of Things: Threats and Solution
Keywords:IoT Security, IoT Threat, IoT Security Challenge,, IoT Security Solution, Systematic Review
The use of the Internet of Things (IoT) has recently become a worldwide trend, as this technology can connect various types of equipment such as sensors, cameras, and other devices via the internet. The broad adoption of various IoT technologies makes life easier and better for people. Internet of things applications has been widely used in Smart Building, Smart Vehicles, Construction Management, health management and many other applications. However, the IoT technology still has many flaws and weakness especially in its security and defense mechanism. This paper reviews and elaborate type of security vulnerabilities, issue and threats that IoT technology faces from academic research paper in the past 10 years. This review also aims to find the possible solutions proposed by researchers to overcome security weakness, threats and issue in IoT technology and its application. This research goal to provide guidelines for those who want to develop and improve IoT security. A systematic review was used as the methodology in this paper. The purpose of this systematic review is to survey the threats and vulnerabilities of IoT technology as reported in previous studies. This review also proposes a comprehensive countermeasure to the previously mentioned threats and weaknesses. This study's findings include the identification and classification of various threats in IoT, as well as methods for countermeasures against these attacks. It concludes with reviews of research gaps and future research directions to improve IoT security.
Copyright (c) 2022 Munirul Ula, Rizal Tjut Adek, Mukhlish
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles, the author must declare https://proceedings.unimal.ac.id/micoms/index as the first party to publish the article.