TY - JOUR
T1 - Comprehensive Study on Cyberattacks and Response in IoT Infrastructure
T2 - Taxonomy, Opportunities, and Survey
AU - Jo, Byung Hyun
AU - Moon, Seo Yeon
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
PY - 2025
Y1 - 2025
N2 - The Internet of Things (IoT) has been rapidly evolving with advanced communication and network technologies in the last few years due to the wide range of usability, adaptability, and smartness. Various smart applications such as healthcare, manufacturing, and others utilize IoT, sensors, and devices and obtain advanced network connectivity. Nevertheless, IoT devices are so small and light, and they have several issues including battery consumption, memory, and security. This paper presents a comprehensive study on cyberattacks and response with solutions for IoT infrastructure. The current growth of IoT security has brought forth security services such as access control, authentication, confidentiality, integrity, availability, privacy, and non-repudiation. Thus, we studied advanced technologies such as blockchain, artificial intelligence (AI), cyber physical systems, and quantum cryptography. Based on these technologies, we proposed layer-wise service scenarios of IoT security in IoT by emerging blockchain, AI, and deep learning. Smart contract-based intelligent data access is discussed at the edge layer and one-time signature-based secure network communication is provided at the fog layer, with secure storage at the cloud layer. Finally, we presented various opportunities and services and summarized the open research challenges and future directions for IoT security in IoT applications.
AB - The Internet of Things (IoT) has been rapidly evolving with advanced communication and network technologies in the last few years due to the wide range of usability, adaptability, and smartness. Various smart applications such as healthcare, manufacturing, and others utilize IoT, sensors, and devices and obtain advanced network connectivity. Nevertheless, IoT devices are so small and light, and they have several issues including battery consumption, memory, and security. This paper presents a comprehensive study on cyberattacks and response with solutions for IoT infrastructure. The current growth of IoT security has brought forth security services such as access control, authentication, confidentiality, integrity, availability, privacy, and non-repudiation. Thus, we studied advanced technologies such as blockchain, artificial intelligence (AI), cyber physical systems, and quantum cryptography. Based on these technologies, we proposed layer-wise service scenarios of IoT security in IoT by emerging blockchain, AI, and deep learning. Smart contract-based intelligent data access is discussed at the edge layer and one-time signature-based secure network communication is provided at the fog layer, with secure storage at the cloud layer. Finally, we presented various opportunities and services and summarized the open research challenges and future directions for IoT security in IoT applications.
KW - Artificial Intelligence
KW - Cyberattacks
KW - IoT Blockchain
KW - Network Security
UR - https://www.scopus.com/pages/publications/105016564227
U2 - 10.22967/HCIS.2025.15.054
DO - 10.22967/HCIS.2025.15.054
M3 - Article
AN - SCOPUS:105016564227
SN - 2192-1962
VL - 15
JO - Human-centric Computing and Information Sciences
JF - Human-centric Computing and Information Sciences
M1 - 54
ER -