Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Table 5

Comparison of existing IoT security mechanisms in different layers.

Method nameLayerDescriptionIssues focused on the method

Risk-based adaptive frameworkNetworkEach portion of the four portions performs its tasks and acknowledges the other.It keeps watching for attacks. It removes the incoming attack at the second portion [115].
Preference-based privacy protectionApplicationThe service provider, client, and third party initiate communication in a secure environment.Between the client and the service provider, the third party acts as a bridge and keeps a check on the security provided to the client through the service provider [121].
OpenHab in the application layerApplicationProvision of security.The device mismatch is not supported but registration is simple [124].
PKI protocolPerceptionA message is sent by the base station to the destination consisting of a public key.The message is delivered independently without compromising security [108].
IoTOneApplicationOpenHab technology issues are solved.A device mismatch is allowed. The request is sent by the client to the server for the verification of the user [124].
Security framework based on identityApplicationRegistration, policy, client, and user authentication are part of this system.Admin describes the policies. Users and all other resources are managed by the framework based on policies [125].
Encryption based on HashPerceptionEncryption algorithms and Hash functions are used in parallel.The integrity of the message is checked [106].
Mechanism-based on the secure authorizationPerceptionRBAC and ABAC mechanisms and systems are based on client-server.Resources are provided by the server to the client on request, thus making the system more secure [109].
Lightweight cryptographic algorithmsPerceptionMessages are converted by using keys.Plain text from the message is converted to a cipher using Hash functions and symmetric and asymmetric keys [233].
Embedded framework of securityPerceptionMemory operating system and run-time environment are secured.More secure memory management, secondary storage, and run-time environment to the users [112].
The framework of identity managementNetworkCommunication is done via service and identity.Information about the user is confirmed by the identity module to protect the users from the attackers [114].
SDN with IoTNetworkLow cost and lesser hardware are used for better performance.IoT agents and controllers are provided security by SDN as all communications are done through SDN [116].
Mechanism-based on reputationNetworkData structures, namely, the reputation table and watchdog mechanism, are maintained by the node to prevent intruders.Ad hoc communication-based system [118].
Heterogeneous fusion mechanism in IoTTransportPrevents disclosure of data and information.Roaming authentication security in the heterogeneous environment [234].