Research Article Open Access

A Survey of IoT Security Issues - From Past to Future Trends

Imran1, Syed Mubashir Ali2, Muhammad Mansoor Alam3 and Mazliham Mohd Su’ud1
  • 1 Universiti Kuala Lumpur, Malaysia
  • 2 Karachi Institute of Economics and Technology, Pakistan
  • 3 Riphah International University, Pakistan

Abstract

This study will focus on Internet of Things (IoT) based security issues. IoT is persuasive in nature and accomplish user’s requirement through the intelligent gadgets like sensors, actuators and physical computation devices. IoT is not just about interconnecting embedded devices or gadgets to the Internet, it is about lifestyle. This study aims at identifying existing and future security issues within IoT by performing a comprehensive literature review of peer-reviewed articles from the last 5 years. The review identifies the IoT privacy and security issues from a different perspective and highlights which security issues have been discussed most by the researchers in past and present as well as highlighting future security issues within IoT. The outcomes are presented and highlighted through graphical representation. In the past, confidentiality, integrity and inter-operability and in present, authenticity, data privacy and security issues have been most widely discussed. In future, integrity, confidentiality and authenticity issues will have more significance and need to be addressed in order to successfully implement and achieve benefits from IoT.

Journal of Computer Science
Volume 17 No. 11, 2021, 1031-1045

DOI: https://doi.org/10.3844/jcssp.2021.1031.1045

Submitted On: 18 March 2021 Published On: 15 November 2021

How to Cite: Imran, Ali, S. M., Alam, M. M. & Su’ud, M. M. (2021). A Survey of IoT Security Issues - From Past to Future Trends. Journal of Computer Science, 17(11), 1031-1045. https://doi.org/10.3844/jcssp.2021.1031.1045

  • 3,709 Views
  • 1,947 Downloads
  • 5 Citations

Download

Keywords

  • Confidentiality
  • Integrity
  • Authenticity
  • Authorization
  • Data Security Privacy
  • Availability
  • Non-Repudiation
  • Access Control
  • Inter-Operability