Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Table 3

Comparison of existing security parameters/approaches/models in IoT cybercrime.

Author (year)IdeologyParametersAdvantagesSecurity issues discussed

Atzori et al. (2010) [32]A survey of internet of things (IoT).Applications, service management, logistics.Applications of IoT were discussed in a detailed manner.
Miorandi et al. (2012) [33]A survey of applications and issues of security in IoT.Applications, security issues of IoT, research challenges.Research challenges and issues of securities were explained in detail.
Gubbi et al. (2013) [35]Application and cloud computing-oriented survey of IoT.Applications, addressing schemes, cloud computing.Cloud computing and its applications in IoT were discussed.
Aggarwal et al. (2013) [36]A survey of applications, data management, and research challenges in IoT.Applications, data management and analytics, security, privacy.Data management in IoT and applications were discussed in detail.
Said (2013) [37]Evaluation of different IoT architectures is presented.Hierarchical architecture, distributed architecture.Different IoT architectures were discussed in detail.
Perera et al. (2013) [38]The authors presented context-aware computing for IoT devices.Context reasoning, context modelling, context distribution.Different contexts related to the IoT were presented.
Granja let al. (2015 ) [39]Communication protocols and security parameters are discussed in detail.Different protocols of IoT communications, application layer, physical layer, and MAC layer security.The security of different layers in IoT communications was discussed in detail.
Sicari et al. (2015) [40]Research challenges and existing solutions in IoT security are presented in the survey.Mobile security in IoT, Trust, and privacy in IoT, enforcement in IoT, authentication, confidentiality, and access control in IoT.Security of IoT was discussed referring to ongoing projects on securing the IoT.
Abomhara and Køein (2015) [41]Research directions concerning IoT security and privacy are presented.Different cyberattacks in IoT, security and privacy challenges in IoT, security threats and challenges.Threats to IoT security were discussed in detail.
Mahmoud et al. (2015) [42]IoT layer architecture and security features are the key aspects of this paper.IoT architecture, IoT security issues, IoT security countermeasures.Basic architectures of IoT and security issues were discussed in detail.
Pescatore and Shpantzer (2016) [43]Surveyed perceptions on IoT, IoT applications, and industry representation by IoT.Applications, threats to IoT, risk management in IoT, data monitoring.The survey conducted with participants was discussed concerning different parameters related to IoT.
Gil et al. (2016) [44]A general survey of IoT and context awareness of IoT.IoT applications domain, services for IoT, data mining for IoT.Services and data as services were discussed. Applications of IoT are also presented.
Iqbal et al. (2017) [232]A review of security solutions against threats on IoT devices.Different techniques of attacks on IoT, security and privacy requirements, security solutions in IoT.The threats to IoT security and its measures to counter the threats were explained in detail.
Vignesh and Samydurai (2017) [46]A survey on IoT layer architecture and security threats on each layer.Security features of IoT, architecture, security remedies.Security issues in IoT and future directions regarding 5G were discussed in the paper.
Razzaq et al. (2017) [47]A survey on different types of threats in IoT and their solutions is discussed.Applications of IoT, Threats to IoT, analysis of different types of attacks.Applications of IoT and analysis of different types of security threats were done.
Maple (2017) [48]A survey of applications of IoT, authentication, and identity management of IoT, security issues of IoT in different applications.Applications of IoT in automobiles, health, industry 4.0, agriculture, entertainment, and media.Security issues on various applications like health and in automobiles were discussed along with privacy challenges in detail.
Rughani (2017) [49]The authors discussed the architecture of IoT devices along with the security aspects and their application in forensics.IoT architecture, IoT security issues, and digital security in IoT.Discussions on forensics in IoT and security issues were discussed.
Corser et al. (2017) [50]The authors laid prime emphasis on the security of IoT devices.IoT hardware security, dynamic testing, securing IoT networks.Certain security issues from a hardware and software perspective were discussed in detail.
Burhan et al. (2018) [51]Compared the different application domains of IoT and discussed the key elements of IoT.Applications of IoT, different architecture layers of IoT.Identity management framework, security mechanisms for IoT, and improved layered architecture for IoT were discussed.
Noor and Hassan (2018) [52]A survey on IoT security, possible attacks on IoT architecture layers are presented.IoT security attacks on layer review on IoT authentication, trust management, and secure routing.Attacks on the IoT architecture layer were explained in detail. Secure routing was presented with key features.
MacDermott et al. (2018) [53]The authors discussed the IoT, the possible crime using, or in IoT devices.Forensic handling regarding IoT and crime using IoT devices.Forensic evidence handling in the smart city was discussed in detail.
Riahi Sfar et al. (2018) [54]A survey on IoT security including discussion on smart manufacturing.A cognitive approach for IoT, recent research in data privacy trust management system.Cognitive and systemic security along with adaptive and context-aware security was discussed in detail.
Neshenko et al. (2018) [55]A survey on the exploitation of different IoT devices.IoT architecture security in IoT, IoT vulnerabilities at different architectural layers.The security aspects of the layer-wise architecture of IoT devices were discussed in detail.
Zhou et al. (2018) [56]A survey on security features and privacy in IoT.Attacks on IoT, threats, and challenges in IoT devices.Threats to IoT hardware devices were discussed in detail.
Lu and Xu (2018) [11]A survey article on IoT cyberattacks and security schemes.Different cyberattack and layer-wise security schemes.Security schemes for different layered architectures were explained in detail.
Aydos et al. (2019) [57]A survey of risk and threat assessment on different architecture layers of IoT.IoT applications, platforms for IoT, IoT protocols, security, threats, and vulnerabilities in IoT.Attack on a different layer in IoT was presented along with a risk-based layered approach for IoT security assessment in detail.
Nasiri et al. (2019) [58]An article on healthcare-based secure IoT environment.Security requirements in IoT.Cybersecurity requirements were discussed.
Tabassum et al. (2019) [59]An article on various security issues in IoT.IoT security requirements and architecture of IoT.Security issues on perception, application, and network layer were discussed in detail.
Servida and Casey (2019) [12]An article on IoT forensics and detection of traces in IoT.Digital forensics, privacy, and IoT forensics.IoT forensics and detection, extraction, and parsing of traces from IoT devices were discussed in detail.
Blythe et al. (2019) [60]An article on cyber hygiene advice for IoT devices.Security features of IoT devices, design code of practice for IoT devices.Standardization of security protocols was the main emphasis.
Adesola et al. (2019) [61]An article on crime management with IoT-based architecture.IoT architecture, data collection, and framework for IoT devices.A crime prediction and monitoring model was proposed.
Abdullah et al. (2019) [16]A review of cybersecurity issues and challenges.Cyberattacks, cybersecurity, IoT architecture, and security techniques.Security techniques at different layers are discussed in detail. The blockchain is implemented to secure the IoT network.
Butun et al. (2019) [1]A survey on different kinds of attacks and their countermeasures in IoT devices.IoT applications, security attacks on IoT devices, attacks on different layers of IoT architecture.Defence against different passive and active attacks on different layers of IoT architecture was discussed in detail.
Stoyanova et al. (2020) [62]A survey on IoT forensics and its challenges.IoT forensic components, IoT attacks, IoT security, IoT protocols, IoT layered architecture.IoT forensics challenges and their solution, secure cloud service models were discussed in detail.
Tawalbeh et al. (2020) [63]An article on security and privacy in IoT devices.Generic IoT layers and proposed system model for secure IoT devices.A system model was proposed using the cloud edge nodes and IoT nodes.
Atlam et al. (2020) [64]An article on cybercrime, security, and digital forensics for IoT devices.IoT applications, IoT architecture, characteristics, and communication technologies in IoT, security threats in IoT.The security solution of four-layered IoT architecture was discussed in detail.