Abstract

The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and discussed several future outlook of challenges and development trends for the IoT technology.

1. Introduction

IoT generally refers to the use of diverse information sensors, radio wave identification technology, laser scanners, infrared sensors, global positioning system, and other equipment to realize actual acquisition of data that need to be interacted, connected, and recorded [1]. The data collected by IoT devices include diverse necessary information such as light, biology, heat, sound, electricity, chemistry, mechanics, and other position information. By connecting the above information to the Internet, one can achieve intelligent perception, identification, and management. The Internet of Things is an extension and expansion network based on the Internet. Through the traditional telecommunication network, the respectively addressed public physical objects are interconnected. Therefore, it is an important part of the emerging information technology [2]. Moreover, the extreme expansion and extension of the Internet is another typical revolution in the information industry after the emergence of computers and the Internet. Therefore, it is often named “Internet where everything is connected” and “The third wave of the world information industry” [3, 4]. As early as 1999, Ashton [5], from MIT Auto-ID Research Center, first put forward the notion of IoT when he studied the connection of radio frequency identification information to the Internet. On November 17, 2005, the International Telecommunication Union [6] published the “ITU Internet Report 2005: Internet of Things,” which formally put forward the notion of “Internet of Things.”

With the sound growth of IoT industries, it has gradually penetrated into all aspects of life [7]. IoT has effectively promoted the intelligent development of infrastructures and day-to-day life such as industries, transportation, homes, and cities, making limited resources more rationally allocated, and greatly improved the quality of human life [8, 9]. However, whereas IoT technologies bring convenience to people’s lives, some security concerns also appear. Security is the most concerned factor when enterprises consider deploying IoT systems, and most of them temporarily shelve their plans to deploy IoT because of these security concerns, which hinders the rising trend of IoT and has greatly affected the popularization and development of IoT [7]. Therefore, IoT will only enter the realistic outbreak stage after breaking through the bottleneck of this security issues. Thus, the development of security and privacy techniques plays a significant place in promoting IoT technologies [10].

In recent years, the three fields of IIoT security, IoV security [11], and smart home security are relatively popular and occupy a large market share. In light of the above analysis, security research in the field of IoT exists in the direction of IIoT, IoV, and smart home. Therefore, this paper will systematically sort out the security issues in these three fields, respectively. We briefly sum up the three aspects below.

1.1. The Security of IIoT

IIoT refers to the use of automated, interconnected sensors, devices, and machinery to drive operational efficiencies at an industrial scale. Many IIoT-related security issues can be traced back to a lack of basic security protections, such as exposed ports, outdated software applications, and shallow authentication. These vulnerabilities directly connect to the network and provide a breach for a saboteur to gain easy access to the entire system. IIoT systems usually combine information technology with operational technology which adds another layer of potential threats [12, 13].

1.2. The Security of IoV

IoV means the dynamic mobile communication system in which vehicles and roads, vehicles and vehicles, vehicles and individuals, and vehicles and sensing devices interact to achieve the communication between vehicles and public networks. At present, IoV has become a significant application scenario of IoT and 5G networks [11]. For IoV, how to prevent vehicle information from being modified and ensure the security and IoV data sharing is a major topic in the development of intelligent driving technologies. In light of the above analysis, ensuring the availability, reliability, real time, and comprehensiveness of data information has become a key study topic in this field [14].

1.3. The Security of Smart Home

Smart home means the comprehensive application of wireless network communication technologies and sensing technologies to furniture household appliances, and it is an important part of IoT and smart home. Security issues act as a key factor hindering the growth of the smart home industry as well [10]. Since smart home products collect a large amount of private data from family members, many homeowners are worried about network security loopholes in connected smart home devices. Therefore, a safe, stable, and reliable smart home information security technology is the focus of existing researches.

In light of the above analysis, there are many types of security researches in the IoT field, relevant problems are complex, and there are relatively few systematic summaries in this field [12]. Therefore, this paper focuses on the three fields of IIoT, IoV, and smart home and focuses on IoT in various scenarios and security issues.

The arrangement of the paper is listed below: Section 2 analyzes the security of IIoT, mainly including the application of hardware securities, data securities, and blockchain technologies. Section 3 introduces the application of data securities, blockchain technologies, and trust management technologies in the security of IoV. Section 4 illustrates the application of network securities, system securities, and blockchain technologies in the field of smart home. Conclusions and future research directions are summed up for these three areas in the last section. Moreover, the overall framework of this paper is listed in Figure 1.

2. The Security of IIoT

With the deep integration of industrialization and informatization, the interconnection of production control systems and production management systems within various enterprises is increasing nowadays, and the need to improve product qualities and operational efficiencies by accessing networks is stronger as well. As a result, IIoT was born that acts as a relevant degree of integration of the Internet and industrial systems, as well as advanced computing, analysis, and sensing technologies. IIoT integrates industrial monitoring systems, material transportation systems, industrial production systems, consumer feedback information systems, industrial management systems, etc. and guides industrial production and improves efficiency by means of the intelligent processing results of diverse data centers [13].

The continuous deepening of IIoT in manufacturing applications means that the networked devices at the factory equipment layer will realize automatic communication and will be closely connected with the market layer and factory management. However, increasingly networked industrial environments make industrial control systems, networked devices, and industrial clouds more vulnerable to attackers, leading to threats such as plant downtime and operational disruption. Therefore, modern smart factories urgently need to take measures from the system, software, hardware, and other levels to handle increasingly complex industrial network security threats [15]. In recent years, based on the frequent occurrence of industrial IoT security incidents, information and network security issues have become a major obstacle to the promotion and application of IIoT [16].

The architecture of IIoT is primarily separated into the perception layer, network layer, and application layer [16]. For the protection of perception layers, related information can be prevented from being obtained at the source, which makes the IoT system secure at the source. At this stage, the security risks faced by IIoT mainly include network data security threats, hardware equipment security risks, software system vulnerability risks, and IoT’s own security risks [1719]. This means to fundamentally break through the security bottleneck of IIoT is the primary challenge to the adoption of IIoT. Moreover, the framework of this section is shown in Figure 2.

2.1. IIoT Hardware Security

The growing number of IoT devices has increased the area of system attacks, and these devices often own vulnerabilities which are opaque to the user yet may be exploited. The hardware devices of IIoT require multifaceted protection of the system back-end and the device itself [20]. Enterprises often organize a hardware device department and a back-end department to jointly solve the security problems of IIoT.

The security risk of IIoT hardware equipment is the biggest problem facing the device layer for the basic operation of IIoT. This includes not only the growing number of new equipment, but also the need to support older industrial control systems [21]. The continuous growth of devices has greatly increased the risk of system intrusion. Some older devices that have weak computing and storage capabilities are easy to be attacked [22]. Moreover, some of the relevant literature is summarized as follows; please see Table 1.

2.2. IIoT Data Security

From the beginning, IIoT owns the characteristics of high interconnectivity, huge network scales, and higher risks than IoT. One of the biggest issues of IoT is to ensure the security of network, data, and devices. Protecting IIoT is a multifaceted work, and its security needs to be considered in all aspects [24].

A complete IIoT system has tens of thousands of “data nodes.” Once a node is breached and infiltrated, the damage will spread through the node network at a high speed, which will have a big influence on the entire system. As of today, the IIoT field is full of risks from the perspective of information securities. Hackers often attack IIoT applications through system vulnerabilities to destroy the system or steal data [25]. Therefore, from the perspective of IIoT and industrial big data security issues, it is crucial to protect the network from the device layer where the data is generated. Data protection is a concern of the entire organization, and the more complex the network, the greater the need for data protection [26]. All in all, IIoT data security requires changes big and small to ensure that networks, systems, data, and devices are protected. Moreover, some of the relevant literature is summarized as follows, as shown in Table 2.

2.3. Blockchain Technology-Based IIoT Security

It is noticed that classical security technologies are not suitable for IoT since topology and resource constraints of IoT. Blockchain owns the feature of data traceability, decentralization, programmability, security, and trustworthiness and can provide new ideas for IoT security issues. The blockchain likes a database ledger, which can depict all transaction records, and the characteristics of completely saving all transaction records make it impossible for anyone to cheat. Simply put, the blockchain is a machine that creates trust, a safe and credible machine [28], which allows people who do not trust each other to exchange information safely without the coordination of an authoritative intermediate institution.

The blockchain system network is a classical P2P network with distributed heterogeneous features, whereas IIoT also has distributed characteristics. IIoT realizes information exchange by applying technologies such as intelligent perception and identification technology [26] and also meets operation requirements and the deployment of blockchain systems. The network features of the two ones determine that the IIoT can take the merits of the advantages of blockchain techniques to solve the pain points of IIoT.

Due to the integration of multiple systems, multiple platforms, and multiple devices, IIoT determines that it must coordinate the use of a variety of different data transmission methods and transmission protocols and open-related ports. At the same time, these factors make data vulnerable to threats during transmission [29]. Blockchain technology can provide a trusted, transparent, and secure communication channel for IIoT, enabling secure communication between devices. Through the decentralized verification system and consensus scheme of the blockchain, the intervention of illegal nodes can be avoided, and the transmitted data is processed by rigorous cryptography. Thus, the data security is guaranteed. Moreover, some of the relevant literature is summarized as follows; please see Table 3.

2.4. Future Research Directions for IIoT

Nowadays, there are still serious roadblocks from an IIoT security perspective. With the massive development of IIoT devices, the volume of generated data will also continue to increase, and whether the data is in edge computing, data centers, or cloud platforms, all data needs to be kept safe. Therefore, in the context of the IIoT, there will need to be a greater focus on how to protect equipment, data, communication, and processing power far beyond the traditional confines of IT [28, 29]. With the in-depth research of blockchain technology, the blockchain can be fully applied to IIoT in the future.

3. The Security of IoV

IoV technology acts as an exploration of IoT. The concept of IoV originated from the combination of VANET and IoT to improve the safety of road users and reduce the number of accidents. IoV integrates a brand-new generation of information with communication technologies and takes the moving vehicle as the information perception object [14]. Realize the network connection of people and vehicles and roads, and further realize the all-round network connection between vehicles and vehicles and vehicles and service platforms. The information transmission network structure of IoV can be divided into three layers from low to high, i.e., the perception layer, the transmission layer, and the application layer.

In recent years, the development of driverless cars and 5G technologies has enriched new fields, and IoV has gradually become the development trend of the automobile industry. Environmental feedback redefines people’s understanding of traditional car travels. However, with the rapid development of smart cars, it also raises serious challenges to the security of the existing IoV [30]. Among them, network security and data security have become important scenarios for the sustainable growth of the IoV industry. With the continuous expansion of the commercial scale of IoV, if the transmission, collection, and use of relevant data are not effectively supervised and regulated, and the data is allowed to flow in an orderly manner, a great data security risk will be formed, and the personal information of vehicle users will be affected. Therefore, the privacy protection constitutes a clear threat. At the same time, the traditional centralized vehicle networking model and its reliance on third-party trust authority led to some security problems in the vehicle networking. If the centralized authority fails, the whole system may not work properly, reducing the availability of the system. Moreover, the framework of this section is shown in Figure 3.

3.1. IoV Data Security

IoV is an important field of deep integration of informatization and industrialization. With the growth of intelligent IoT technologies, the risks of IoV and data security have also become increasingly prominent. Whereas rapidly developing IoV technology, the United States and Europe attach great importance to the network security management, protection system construction, data security, and privacy protection of the IoV life cycle [30].

In the process of using smart cars, from data collection to transmission, to processing and use, there are network security and data security risks in the entire life cycle. Suppliers provide customized services to customers by collecting information about vehicles and personnel. For instance, more and more manufacturers use the biometric technology to collect data such as user’s driving habits and usage preferences and use this data to mine and provide value-added services. Therefore, the data security and network security of IoV are also facing severe challenges. Once the database or control system is hacked through the network connection, it may lead to serious consequences such as personal fingerprints, iris, and other biometric information being stolen and driving routes and parameters being tampered with [31, 32]. Moreover, some of the relevant literature is summarized as follows, as shown in Table 4.

3.2. Blockchain-Based IoV Security

IoV technology requires secure and transparent systems. The blockchain owns the feature of nontampering, decentralization, and traceability, which can enhance the data privacy and security transparency of entire systems. Thus, the development of blockchain technologies can become an important boost to the data security of IoV [33]. The nontamperable modification of data by distributed storage of blockchain can permanently store each group of vehicles with location and time data, data related to the vehicle itself, and the corresponding owner information data and the owner’s consumption habits, hobbies, and other information forever. Recorded in the blockchain, it can achieve the stabilization of automobile big data, solve the problems of vehicle data security and integrity [34], and improve the efficiency of collaborative management between government regulatory authorities and enterprises in the automotive industry.

The advantages of blockchain technologies and their applications to access control, communication security, and data security of IoV are of great significance to enhance the security of IoV. However, the blockchain-based IoV security technology still faces many challenges when showing its vitality. The inefficient block generation mechanism leads to high transaction data processing latency, the massive IoV data puts pressure on the storage space of blockchain nodes and the security risks of blockchain itself, the underlying technology of different blockchains restricts the interconnection between multiple chains, the anonymity of user identity of blockchain hinders the tracking and tracing of network security events, and the antitampering feature of blockchain increases the security of IoV and the difficulty of content management, etc., all urgently need to be addressed [35, 36]. Moreover, some of the relevant literature is summarized as follows; please see Table 5.

3.3. Trust Management-Based IoV Security

Trust is a key topic in IoV. Since the construction of IoV needs to simultaneously meet the large scale of data and the information sensitivity required by many services, it is a challenge to build a reliable IoV system. Trust is multifaceted and may include trust between users when automatically disseminating information and the trustworthiness of the IoT concept itself, etc. [37, 38] As IoT is decentralized, assessing its trustworthiness is very challenging. Therefore, minimizing the ambiguity of the service mode of IoV systems, clarifying the intention of information use, legally binding suppliers, and adopting the concept of privacy by design can improve the privacy security of users and promote establishment of the trust in IoV [39].

In existing privacy researches based on IoV, most of them have adopted the ideas of blockchain technologies, federated learning, hybrid trust management, node credibility evaluation and differential privacy [40], virtual travel itineraries, credibility and private information retrieval, etc. Moreover, some of the relevant literature is summarized as follows, as shown in Table 6.

3.4. The Future Research Direction of IoV

As there are enormous personal information exchanges and information recipients in IoV, it is extremely difficult to whole network security, data security, and privacy security in the IoV industry. Future research on blockchain-based IoV security technology should also focus on client-oriented fine-grainedness [36], dynamic access control mechanisms, or cryptography-based communication protocols, from blockchain-based secure data transmission. Conduct in-depth research on distributed key distribution of communication protocols, lightweight consensus mechanism design, and blockchain-based car networking security architecture design.

4. The Security of Smart Home

With the enhancement of people’s living standards, the concept of smart home has received more and more attention, and smart homes have gradually entered individuals’ lives. The application of IoT in smart homes makes smart homes more convenient in terms of installation, operation, convenience, and use and improves the precision and digital intelligence of life technology services [41]. Bill Gates once said: “In the near future, a house without a smart home system will be like a house without Internet access today, which is not in line with the trend.” Therefore, under the general trend of IoT, the family era has come.

However, high-level smart home security assistance is also a decisive factor for the rapid development of the smart home industry. Security issues in smart homes are usually not due to external intrusions (such as hacking) leading to malfunctions or device damage (such as malicious activation of the heating mode of the air conditioner in hot summer) [42]. From the application point of view, privacy leakage is the biggest security risk of the smart home. Current researches mainly focus on improving privacy security from the perspectives of network, system, and data processing. Moreover, the framework of this section is shown in Figure 4.

4.1. Smart Home Network Security

Cybersecurity has become a realistic issue in the growth of smart services. The smart home network system consists of three parts: terminal controller, IoT devices, and network [41]. The user sends commands to IoT devices, such as smart home appliances, through the network by downloading the corresponding client via using software and the Internet to achieve automatic control, remote control, and other functions [42].

As long as the home system is connected to the Internet, hackers will be able to invade the smart home system, so as to ensure the security of the smart home system first need to ensure network security, and the network entrance to the smart home is the home gateway. In reality, people often pay more attention to the stability of the gateway to access the network, ignoring the security of the gateway, and the only device with gateway commonly used in the home at present is only the router. Therefore, in the process of smart home applications, the privacy protection of family and individuals should be the primary issue [43]. Due to the fact that before the emergence of smart homes, both furniture and home appliances are silent and unconnected, the privacy of residential families and individuals would not have conditions and ways to be able to be accessed by third parties [41]. However with network connectivity, the smart home, a new type of system that can sense, network, store, compute, and execute, does make this possibility a reality.

In the application phase of smart home, the devices first have to access the cloud server by accessing the Internet and protocols. The most important of them are wireless IoT protocols, and the main ones are currently WiFi, Bluetooth, Zigbee, Z-Wave, and NB-IoT. The design flaws and security vulnerabilities of access protocols are also an important source of security threats to smart devices [4244]. More seriously, because time-to-market is one of the key factors for a vendor’s profitability, the security design and testing of devices by vendors is often far from adequate in order to be able to get to market as soon as possible. Moreover, some of the relevant literature is summarized as follows; please see Table 7.

4.2. Smart Home Systems Security

Smart home security requires a series of cybersecurity protocols or bills at the legal level but also needs measures at the technical level [45]. Smart homes are installed and deployed to indoor spaces as projects/systems, so the core remains the security of the system. It is ideal to design a smart home system with a reliable security policy and a well-defined system security and authentication process.

The connection of the network may expose the device to attackers inside or outside the network who can exploit software or hardware vulnerabilities to achieve. To solve this problem, the smart home domain monitoring system uses defensive programming, which monitors and checks whether the behavior of smart devices is safe and reasonable. In addition, many experts and scholars study the development of smart access control systems, smart door and window security systems, gas leak detection, personnel location, remote video surveillance, and database systems [46]. Such systems have the merits of low power consumption, low cost, distributed, and self-organization of wireless sensor networks, which can effectively improve the flexibility and reliability of security systems. Moreover, some of the relevant literature is summarized as follows; please see Table 8.

4.3. Blockchain-Based Smart Home Security

Security issues are a key factor hindering the growth of the smart home industry. As smart home products collect a large amount of privacy data of family members, many users are worried about the situation of network security vulnerability of the connected smart home devices. Blockchain technology can provide a solution to the smart home security problem, which can make device identification and identity verification more effective and reduce the possibility of malicious data tampering by others. The distributed network structure feature of blockchain can largely ensure that even if one or more nodes are breached, the data of the overall network system is still safe and secure [4850]. Meanwhile, the integration of blockchain distributed technology with the underlying hardware makes it easier to design a secure consensus algorithm protocol, which makes the overall blockchain network operation more stable.

Applying blockchain technology in the data transmission of smart home devices can make the user’s data and privacy more secure [49] and solve the security problem of smart home to some extent. Moreover, some of the relevant literature is summarized as follows, as shown in Table 9.

4.4. Future Directions of Smart Home

According to the security analysis from the perspectives of network protocols, data information, and platform systems in the smart home industry, the establishment of a unified standard system is the first task if the smart home industry wants to get a good and sustainable development [50]. At present, the security performance of smart home devices is still low, and the access data is still easy to be stolen or even tempered with. Therefore, device access control and protection of personal privacy data should also be considered in the future. Meanwhile, the capacity and processing speed of blockchain also need to be gradually improved so as to realize the extensive application of blockchain technology in the area of smart home securities [51].

5. Conclusions and Future Works

The promotion of IoT technologies needs to address plenty of related security issues and the large number of scenarios of IoT applications as well as the low generalization ability of security issues among scenarios which leads to the difficulty in the wide application of IoT technologies [50, 51]. Based on the security of IoT applications, researchers have actively started to explore this area and promote the rapid development of this field. In this work, we explore the security technologies for a total of three popular areas of IoT, i.e., IIoT, IoV, and smart home, and analyze them in the direction of device security, data security, network security, and system security. First, it is found that the application of blockchain technology has become an effective way to improve the security of IoT. Second, at the domain level, future research can also be done on coal, medical, and defense industries [52]. At the technical level, machine learning, deep learning, cloud computing, and big data techniques can be employed to further improve IoT security in the future. Finally, as IoT security research is the frontier of research direction in the field of IoT, more researchers are needed to conduct in-depth research in order to better exploit the value of IoT and in turn serve society [53, 54].

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

This research was funded in part by the Shanxi Province Scientific and Technological Achievements Transformation and Intellectual Property Transaction Service Platform Operation Services; the Shanxi Province Digital Economy Development Research Department; and the Information Technology Application Innovation Provincial Technology Innovation Center.