Comprehensive Study on Cyberattacks and Response in IoT Infrastructure: Taxonomy, Opportunities, and Survey

Research output: Contribution to journalArticlepeer-review

Abstract

The Internet of Things (IoT) has been rapidly evolving with advanced communication and network technologies in the last few years due to the wide range of usability, adaptability, and smartness. Various smart applications such as healthcare, manufacturing, and others utilize IoT, sensors, and devices and obtain advanced network connectivity. Nevertheless, IoT devices are so small and light, and they have several issues including battery consumption, memory, and security. This paper presents a comprehensive study on cyberattacks and response with solutions for IoT infrastructure. The current growth of IoT security has brought forth security services such as access control, authentication, confidentiality, integrity, availability, privacy, and non-repudiation. Thus, we studied advanced technologies such as blockchain, artificial intelligence (AI), cyber physical systems, and quantum cryptography. Based on these technologies, we proposed layer-wise service scenarios of IoT security in IoT by emerging blockchain, AI, and deep learning. Smart contract-based intelligent data access is discussed at the edge layer and one-time signature-based secure network communication is provided at the fog layer, with secure storage at the cloud layer. Finally, we presented various opportunities and services and summarized the open research challenges and future directions for IoT security in IoT applications.

Original languageEnglish
Article number54
JournalHuman-centric Computing and Information Sciences
Volume15
DOIs
StatePublished - 2025

Keywords

  • Artificial Intelligence
  • Cyberattacks
  • IoT Blockchain
  • Network Security

Fingerprint

Dive into the research topics of 'Comprehensive Study on Cyberattacks and Response in IoT Infrastructure: Taxonomy, Opportunities, and Survey'. Together they form a unique fingerprint.

Cite this