Academia.eduAcademia.edu

A Survey of IoT Security Issues - From Past to Future Trends

2021, Journal of Computer Science

https://doi.org/10.3844/jcssp.2021.1031.1045

This study will focus on Internet of Things (IoT) based security issues. IoT is persuasive in nature and accomplish user’s requirement through the intelligent gadgets like sensors, actuators and physical computation devices. IoT is not just about interconnecting embedded devices or gadgets to the Internet, it is about lifestyle. This study aims at identifying existing and future security issues within IoT by performing a comprehensive literature review of peer-reviewed articles from the last 5 years. The review identifies the IoT privacy and security issues from a different perspective and highlights which security issues have been discussed most by the researchers in past and present as well as highlighting future security issues within the IoT. The outcomes are presented and highlighted through graphical representation. In the past, confidentiality, integrity, and inter-operability and in the present, authenticity, data privacy, and security issues have been most widely discussed. In future, integrity, confidentiality, and authenticity issues will have more significance and need to be addressed in order to successfully implement and achieve benefits from IoT.

Journal of Computer Science Original Research Paper A Survey of IoT Security Issues - From Past to Future Trends 1,2 Imran, 1,4Syed Mubashir Ali, 1,3Muhammad Mansoor Alam and 1Mazliham Mohd Su’ud 1 Malaysian Institute of Information Technology (MIIT), Universiti Kuala Lumpur, Kuala Lumpur 50250, Malaysia College of Computer Science and Information Systems, Institute of Business Management, Karachi, Pakistan 3 Riphah International University, Rawalpindi, Pakistan 4 College of Computing and Information Sciences, Karachi Institute of Economics and Technology, Karachi, Pakistan 2 Article history Received: 18-03-2021 Revised: 26-04-2021 Accepted:03-05-2021 Corresponding Author: Mazliham Mohd Su’ud, Malaysian Institute of Information Technology (MIIT), Universiti Kuala Lumpur, Kuala Lumpur 50250, Malaysia Email: [email protected] Abstract: This study will focus on Internet of Things (IoT) based security issues. IoT is persuasive in nature and accomplish user’s requirement through the intelligent gadgets like sensors, actuators and physical computation devices. IoT is not just about interconnecting embedded devices or gadgets to the Internet, it is about lifestyle. This study aims at identifying existing and future security issues within IoT by performing a comprehensive literature review of peer-reviewed articles from the last 5 years. The review identifies the IoT privacy and security issues from a different perspective and highlights which security issues have been discussed most by the researchers in past and present as well as highlighting future security issues within IoT. The outcomes are presented and highlighted through graphical representation. In the past, confidentiality, integrity and inter-operability and in present, authenticity, data privacy and security issues have been most widely discussed. In future, integrity, confidentiality and authenticity issues will have more significance and need to be addressed in order to successfully implement and achieve benefits from IoT. Keywords: Confidentiality, Integrity, Authenticity, Authorization, Data Security Privacy, Availability, Non-Repudiation, Access Control, Inter-Operability Introduction Internet has revolutionized the way we live. It is being improving our standard of living by leaps and bounds. Nowadays, internet is imperative for performing our day to day activities. According to Figure 1 (Farooq et al., 2015), it is predicted that by 2020, there would be more than 50 billion devices connected to the internet. Due to the widespread use of internet, IoT has gained a lot of importance by both the practitioners and academicians. There has been an increase in the trend of IoT adoption by both home users as well as industries and this trend will continue in future (Gaikwad et al., 2015). IoT enables two-way communication between humans and computers in different geographical locations through the use of internet. (Hossain et al., 2015). The IoT can connect billions of devices at a time without any delay (Alamri et al., 2019). Security and privacy issues in IoT are more challenging than in ordinary wireless situations (Conti et al., 2018). The major issues of IoT are the message modification and/or alteration, confidentiality, integrity, availability, authenticity and Denial of Service (DoS) etc. (Sfar et al., 2018; Wang et al., 2018). Security and privacy are one of the most important challenges while sharing critical information within the IoT (Khan and Salah, 2018) (Adat and Gupta, 2018) This study will identify and present various types of security issues in present, past and future (Liu et al., 2020a-b). Specifically, this study aims at addressing the following research objectives: a. b. c. To identify potential security issues within IoT To understand which IoT security issues have gained more attention in the literature To identify and highlight the research gap for future researchers in the area of IoT security To achieve the above mentioned research objectives, this research employs literature review methodology to first identify the security vulnerabilities in IoT. Then further analysis has been done to understand the pattern of how much importance have been given by the researchers to various security issues within IoT. The results are then further analyzed with respect to past, current and future state of least and most addressed security issues within IoT. © 2021 Imran, Syed Mubashir Ali, Muhammad Mansoor Alam and Mazliham Mohd Su’ud. This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 60 50.1 50 42.1 34.8 Devices 40 28.4 30 22.9 18.2 20 8.7 11.2 14.4 10 0 2012 2013 2014 2015 2016 2017 2018 2019 2020 Years Fig. 1: Predictable perception of smart objects by the year 2020 (Farooq et al., 2015) Research Background The concept of IoT was first introduced by Kevin Ashton in 1999 (Andrea et al., 2015). In the last decade, there has been an increase in the use and adoption IoT by both the home users and industries. (Alsaadi and Tubaishat, 2015). IoT is a set of networking technologies that transforms a regular object into a smart object (Khanna and Kaur, 2019). Wearable devices are also part of IoT applications, such as, pulse screens and smart-watches. Smart IoT has also been termed as Industrial IoT or IIoT when implemented in an industry. Figure 2 depicts an overview of various applications of smart IoT (Sadeeq et al., 2018). Network devices within IoT are processing huge amounts of data as they are continuously transmitting and receiving data. This transfer and storage of data within the network are prone to security breach by cybercriminals and hackers for achieving ulterior motives (Sfar et al., 2018). The system attackers can steal sensitive data, for example, area information, credit card numbers, passwords of money related records by hacking into the IoT devices (Amadeo et al., 2016). Additionally, smart homes and offices can be monitored and electricity or connectivity can be remotely controlled through IoT by hackers which can be dangerous for the people and their assets in the homes or offices (Almotiri et al., 2016). Due to the above mentioned reasons, it is evident that there is great deal of importance of security and privacy issues within IoT. information from being accessed by unauthorized persons (Miloslavskaya and Tolstoy, 2019), (Hameed et al., 2019). Integrity refers to ensuring the authenticity of exchanged information by not allowing anyone to alter or tamper the information (Al-Sharekh and Al-Shqeerat, 2021) Availability is about making sure the systems/information is available when needed without interruption (Farooq et al., 2015). Authorization is to ensure and verify that the user have the required control permissions or privilege to perform the operation or certain action (Al-Sharekh and Al-Shqeerat, 2021). Access Control is a security mechanism to handle and grant access rights to only authorized entities (Ali et al., 2019). Authenticity deals with personal information or identification. It includes validating the incoming request against certain identifying credentials (Ali et al., 2019). Non-repudiation is making evidence to prove certain actions in order to ensure that it can’t be repudiated later and is achieved by using Digital Signatures and Timestamps (Yaqoob et al., 2019). Inter-operability represents the ability of several systems to connect, exchange and share information with one another, without restrictions (“An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges,” 2018). Table 1. IoT Security Vulnerabilities in Each IoT Layer IoT Security Issues Security Issues in Each Layer of IoT Confidentiality, Integrity and Availability (CIA) are the main information security issues within any technology (Basu et al., 2015) The main security issues within IoT are presented below. Confidentiality is to protect the sensitive IoT has three layers named as perception, network and application layers (Hussain, 2017). Various security issues and challenges have been identified and discussed in the literature which are shown in Table 1 (Mendez Mena et al., 2018a). 1032 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 research objectives. This technique also helps to distinguish, choose and fundamentally evaluate the significant investigate and gather and analyze information from the studies that is remembered for the survey by using PRISMA flowchart (Mendez Mena et al., 2018a), (Hassan et al., 2020) Figure 3. The following steps are: a. b. c. Fig. 2: The smart IoT applications (Sadeeq et al., 2018) d. Table 1: IoT security vulnerabilities in each IoT layer Application layer Data access, authenticity, data protection, data privacy, authorization and availability vulnerabilities Network layer DoS, Eavesdropping/Sniffing, Routing Attacks Perception layer Node capture, DoS attack, sybil attack Application Layer The application layer is liable for conveying application-specific services to the user. It describes various applications of IoT devices such as smart homes, industries and business (“Security and Privacy Grand Challenges for the Internet of Things,” 2015) The main security and attack risks on the application layer are data authentication, data privacy, authorization, availability and confidentiality (Sisinni et al., 2018). Eligible Studies and Criteria During the literature review, more than 700 research articles are studied from various known research journals by examining and evaluating the different electronic databases related to privacy and security ranging year 2015 to 2020. Most of the papers consist of detailed explicit research which is clear and centered including the method of reasoning for survey having eligibility examine models. The contributions of the qualitative research comparing with upcoming literature (Granjal et al., 2015a) in the discussed domain are as follows: a. Network Layer The network layer is liable for interfacing with other smart things or objects and network gadgets. Its features are also utilized for preparing and transmitting sensor information (“Security and Privacy Grand Challenges for the Internet of Things,” 2015) The main security issues in the network layer are DoS, eavesdropping, routing attacks (Chen et al., 2018). b. c. d. Perception Layer Physical layer consists of sensors for collecting information from the environment. These sensors used some physical parameters to recognize other smart gadgets in the environment (Hussain, 2017). The main security issues in the perception layer are DoS attack, Sybil attack etc. (Sun et al., 2018). Research Methodology This Section presents the paper that is clear of a detailed inquiry that utilizes precise and the most appropriate method such as the electronics search method, data extraction, eligibility criteria in order to achieve our This literature review is focused on the eligible studies of the different electronics databases and review more than 700 papers and discuss how to filter out the numbers of papers from 2015 to 2020 Works on an extensive, reproducible search technique strategies Identifies all relevant studies (both published and unpublished) Evaluates all results for inclusion/exclusion, selection and eligibility criteria and also a balanced summary of findings to complete Approximate three digits of review papers related to security issues were filtered out because we found one of the major challenges of IoT devices is security This review identifies the IoT limitations with respect to different levels and their security issues During the survey, we gathered information about the different issues of IoT application from the past, present & future perspective This study provides a detailed view of IoT challenges introduced previously and ongoing literature and which is related to the present research work Search Methods The distribution of research articles as per the issues concerning to privacy and security in IoT is categorized as past, present and future issues for analytical purposes. The papers reviewed for the issues of the discussed topic chosen as past ranging from January 2015 to December 2017, while for present issues it was considered the range from January 2018 to December 2019 and future issues are considered for the year of 2020 from January to December to explore these issues and challenges in various manner. 1033 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Fig. 3: PRISMA flowchart of included articles Electronic Searches As suggested by (Shafiq et al., 2020) and based on our previous experience, this study was accomplished using electronic databases like Google Scholar, Springer, IEEE, ACM and Research Gate containing published articles including many unpublished, on- proceeding drafts as well. This study has also included audit papers through the Google search engine (first 300 papers). Data Extraction The factors used to extract this review the author and year of publication, privacy and security, the technique used, methodology and design of the study, which is taken as one complete data set to synthesize the comprehensive report on all parts of the presented survey. Inclusion and Exclusion Criteria This study smartly searched 700 research papers out of which 449 papers is removed due to duplication of topic. In the screening, the titles and modified works, a sum of 228 papers or articles were inspected in detail. Out of these, 117 papers or article are related to the application, privacy and security. These included studies were from 2015 to 2020. Results and Discussion This Section will analyze and discuss about the results to our research objectives after review the papers. Table 2 shows the contribution of each of the reviewed paper. Our research model has used 3 different analytical aspects for the literature review by analyzing the most and the least discussed IoT security issues in the literature with respect to past, present and future era to understand the research trends and identify research gap within the area of IoT security. Figure 4 shows the graphical representation of total number of papers in the past era addressing each IoT security issue. It can be observed that “data security and privacy” and “integrity” with 32 and 16 papers respectively and authenticity and confidentiality were both equally discussed with 14 papers are the most discussing security issues in the past. “Non-repudiation”, “authorization” and “inter-operability” with 2, 7 and 9 papers respectively are the least discussed IoT security issues in past era. In Table 3 1034 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 discussed paper in past era i.e. from 2015 to 2017. Future IoT Security Issues Present IoT Security Issues We have grouped the papers from January 2020 to November 2020 and considered those papers’ discussing IoT security issues as future research trends. Table 5 highlights what security issues have been highlighted and discussed by each short listed paper in year 2020. Figure 6 shows the graphical representation of total number of papers in the addressing each IoT security issue in year 2020. It can be observed that “data security and privacy” have been discussed in 14 papers, “authenticity” and “confidentiality” both been discussed by 5 papers and “integrity” issue by 4 papers. The least discussed security issues in future era as evident from literature is “non-repudiation” with no papers discussing this issue. Other least discussed security issues in future can include “Authorization” with 1 paper and “data availability”, “access control” and “interoperability” with 2 papers each. We have grouped the papers from January 2018 to December 2019 and considered those papers’ discussing IoT security issues as present time issues. Table 4 highlights what security issues have been highlighted and discussed by each short listed paper from present era i.e., from 2018 to 2019. Figure 5 shows the graphical representation of total number of papers in the present era addressing each IoT security issue. It can be observed that “data security and privacy” and “integrity” with 38 and 18 papers respectively and authenticity and confidentiality were both equally discussed with 14 and 16 papers are the most discussing security issues in the present. “Non-repudiation”, “authorization” and “inter-operability” with 5, 14 and 14 papers respectively are discussed IoT security issues in present era. Fig. 4: Distribution of paper by IoT security threats in past Fig. 5: Distribution of paper by IoT security threats in present 1035 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Table 2: Summary of contribution of each reviewed article (Past, Present and Future) REF # Contribution (past) Farooq et al. (2015) Prospective vulnerabilities and discrepancies in IoT Gaikwad et al. (2015) To utilize IoT framework for smart homes. Hossain et al. (2015) Addressing security and frame works related designs in IoT. Andrea et al. (2015) The investigation of security issues, Challenges and open issues in IoT Alsaadi and Tubaishat (2015) To evaluate IoT services in terms of security challenges Amadeo et al. (2016) IoT contemplation in field of various patterns utilization. Basu et al. (2015) Presenting security challenges related to IoT. (“Security and Privacy Grand Challenges The confine IoT security-related matter. for the Internet of Things,” 2015) The Network security related vulnerabilities in IoT Singh and Singh (2015) The security configuration related discrepancy in IoT Alaba et al. (2017) (“Evolving privacy: From sensors to The savvy of IIoT security challenges s and vindicated outcomes. the Internet of Things,” 2017) Kolias et al. (2016) The shortcomings in security of IoT middleware devices. Billure et al. (2015) Review about the IoT applications and their issues Perera et al. (2015) To assess the security examination of rising IIoT with Marketplace Riazul Islam et al. (2015) The overview of an extensive in the health care area utilizing IoT Sadeghi et al. (2015) Review the security and protection challenges in IIoT Breivold and Sandstrom (2015) Assess the security, protection and trust in IIoT Hossain et al. (2015) The security challenges, business openings and reference engineering for E-trade in IoT Nalbandian (2015) Apprise weak compliance research papers in IoT. Zaslavsky and Georgakopoulos (2015) Analyze the challenges and front line and its answers in web-scale sensor Information Management and Mobile Analytics using IoT Granjal et al. (2015b) The present status of various security issues with respect to IoT Pescatore and Shpantzer (2014) Existing conventions and open research security issues for IoT Gil et al. (2016) Review to making sure the IoT security Ouaddah et al. (2017) Address short comings in IoT security and protection. Tzounis et al. (2017) Security and protection suggestions for IoT Abomhara and Køien (2015) Review about the Vulnerabilities, Threats, Intruders and the IoT Mosenia and Jha (2016) The Privacy and Security concerns in Wearable and IoT gadgets Yaqoob et al. (2017a) Discuss about the Taxonomy of security assaults for IoT REF # CONTRIBUTION (PRESENT) Conti et al. (2018) Portray the new interoperability, the executives and Security Challenges in IoT Riahi Sfar et al. (2018) Assess the security different difficulties of the IoT Adat and Gupta (2018) The Recent Advances, Taxonomy, Requirements and Open Challenges for IoT Architecture Khanna and Kaur (2019) Examine the interferences to the utilization of farming, late advances and future difficulties for IoT Miloslavskaya and Tolstoy (2019) The point of the various security issues and its solutions and future headings Hameed et al. (2019) Assess the security challenges for cutting edge systems for IoT Ali et al. (2019) Review the innovations, applications and difficulties of IoT Sisinni et al. (2018) Overview the safe steering for IoT Sun et al. (2018) The review of various skills, issues and Prospects in IoT for Smart Healthcare Nord et al. (2019) The point of the data-driven systems for IoT difficulties and openings Sha et al. (2018) The survey of product characterized remote systems administration openings and difficulties for IoT Grammatikis et al. (2019) Review the open issues incorporation of distributed computing with IoT Atlam et al. (2018) Discuss and review the dependent on setting careful managements for IoT Alphand et al. (2018) Review of "Hands-On" IoT security Hou et al. (2019) Overview the security of IoT Mendez Mena et al. (2018b) Evaluate the various challenges of IoT Forsstrom et al. (2018) Assess the issues and new research frontiers in the field of IoT REF # CONTRIBUTION (FUTURE) Stoyanova et al. (2020a) The Challenges and new endeavors for the inclusion of IoT security and legal sciences Song et al. (2020) Review the top benefits and challenges of IoT and Data Analytics in Agriculture Khadam et al. (2020) Review and guide for security challenges in the IoT Perera et al. (2020) The issues, difficulties, scientific classification and design security in IoT. Hossain et al. (2020) Survey the Blockchain-based Secure IoT Control Scheme. Mbarek et al. (2020) The assessment researches the action towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure Basahel and Yamin (2020) The effect on security issues and open issues in IoT Hamad et al. (2020) The investigation to finds the issues of the guide for security challenges in the IoT Berger et al., 2020) The investigation reviews how taxonomy, challenges and practice for IoT security and vulnerabilities 1036 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Table 3: IoT security issues in the past Issues/Era Confidentiality Integrity Authenticity Authorization Data security privacy Availability Non-repudiation Access control Inter-operability 2015 Gaikwad et al. (2015; Hossain et al., 2015; Andrea et al., 2015; Alsaadi and Tubaishat, 2015; Riazul Islam et al., 2015; Pescatore and Shpantzer, 2014; Abomhara and Køien, 2015; Sicari et al., 2015; Vasilomanolakis et al., 2015; Weber, 2015; Mahmoud et al., 2015; Granjal et al., 2015a) Gaikwad et al. (2015; Hossain et al., 2015; Andrea et al., 2015; Basu et al., 2015; Billure et al., 2015; Riazul Islam et al., 2015; Breivold and Sandstrom, 2015; Abomhara and Køien, 2015; Mahmoud et al., 2015; Granjal et al., 2015a) Gaikwad et al. (2015; Hossain et al., 2015; Andrea et al., 2015; Riazul Islam et al., 2015; Pescatore and Shpantzer, 2014; Abomhara and Køien, 2015; Sicari et al., 2015; Vasilomanolakis et al., 2015; Mahmoud et al., 2015; Granjal et al., 2015a) Farooq et al. (2015; Riazul Islam et al., 2015; Abomhara and Køien, 2015; Vasilomanolakis et al., 2015) Gaikwad et al. (2015; Andrea et al., 2015) (“Security and Privacy Grand Challenges for the Internet of Things,” 2015) Singh and Singh (2015) Perera et al. (2015) Sadeghi et al. (2015), Breivold and Sandstrom (2015) Ali et al. (2015) Nalbandian (2015) Abomhara and Køien. (2015; Granjal et al., (2015a) Sicari et al. (2015) Vasilomanolakis et al. (2015) Weber (2015; Fersi, 2015) Whitmore et al. (2015) Maras (2015; Arias et al. (2015) Gaikwad et al. (2015; Hossain et al., 2015; Andrea et al., 2015; Singh and Singh, 2015; Riazul Islam et al., 2015; Breivold and Sandstrom, 2015; Abomhara and Køien, 2015; Vasilomanolakis et al., 2015; Mahmoud et al., 2015) Hossain et al. (2015; Riazul Islam et al., 2015; Vasilomanolakis et al., 2015) Hossain et al. (2015; Andrea et al., 2015; Pescatore and Shpantzer, 2014; Sicari et al., 2015; Granjal et al., 2015a; Granjal et al., 2015a) Billure et al. (2015; Perera et al., 2015; Breivold and Sandstrom, 2015; Ali et al., 2015; Nalbandian, 2015; Weber, 2015; Fersi, 2015) 2016 (Weber and Boban, 2016) 2017 Alaba et al. 2017; Ouaddah et al., 2017; Mosenia and Jha, 2016) Gil et al. (2016; Elkhodr et al., 2016; Weber and Boban, 2016) Alaba et al. (2017; Ouaddah et al., 2017; Mosenia and Jha, 2016; Yaqoob et al., 2017b) Elkhodr et al. (2016; Gupta and Shukla, 2016; Sood et al., 2015) (Alaba et al., 2017) Gupta and Shukla (2016) Alaba et al. (2017; Ouaddah et al., (2017) (Hussain, 2017), (“Evolving privacy: From sensors to the Internet of Things,” 2017), (Ouaddah et al., 2017), (Tzounis et al., 2017), (Mosenia and Jha, 2016), ( Yaqoob et al., 2017a), (Yaqoob et al., 2017b), (Risteska Stojkoska and Trivodaliev, 2017), (Atlam et al., 2017), (Guarda et al., 2017), (Baker et al., 2017), (Mehmood et al., 2017) (Amadeo et al., 2016), (Kolias et al., 2016), (Gil et al., 2016), (Elkhodr et al., 2016), (Weber and Boban, 2016), (Kumar et al., 2016), (Shah and Yaqoob, 2016), (Airehrour et al., 2016), (Sicari et al., 2016) (Shah and Yaqoob, 2016) Ouaddah et al. (2017; Mosenia and Jha, 2016) (Mosenia and Jha, 2016) Gil et al. (2016) Elkhodr et al., 2016) Alaba et al. (2017) Ouaddah et al. (2017) Elkhodr et al. (2016) Shah and Yaqoob (2016) Hussain (2017; Tzounis et al., 2017; Yaqoob et al., 2017a; Risteska Stojkoska and Trivodaliev, 2017; Mehmood et al., 2017) Table 4: IoT security issues in the present era Issues/Era 2018 2019 Confidentiality Adat and Gupta (2018; Mendez Mena et al., 2018a; Chen et al., 2018; Atlam et al., 2018; Mendez Mena et al., 2018b; Ali et al., 2020) Adat and Gupta (2018; Mendez Mena et al., 2018a; Chen et al., 2018; Sun et al., 2018; Atlam et al., 2018; Mendez Mena et al., 2018b; Ali et al., 2020; Ni et al., 2018; Fakhri and Mutijarsa, 2018; Choi et al., 2018; Yu et al., 2018) Conti et al. (2018; Chen et al., 2018; Atlam et al., 2018; Mendez Mena et al., 2018b; Choi et al., 2018; Yu et al., 2018; Agrawal et al., 2018; Das et al., 2018) Conti et al. (2018; Chen et al., 2018; Ali et al., 2020; Das et al., 2018) Conti et al. (2018; Wang et al., 2018; Adat and Gupta, 2018; “An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges,” 2018; Mendez Mena et al., 2018a; Khanna and Kaur (2019; Hameed et al., 2019; Al-Sharekh and Al-Shqeerat, 2019; Nord et al., 2019; Grammatikis et al., 2019; Hou et al., 2019; Chen et al., 2019) Alamri et al., 2019; a-Shqeerat, 2019; Nord et al., 2019; Grammatikis et al., 2019) Integrity Authenticity Authorization Data security privacy 1037 Alamri et al., 2019; Al-Sharekh and Al-Shqeerat, 2019; Ali et al., 2019; Grammatikis et al., 2019; Hou et al., 2019; Mohamad Noor and Hassan, 2019) Al-Sharekh and Al-Shqeerat (2019; Zhang et al., 2018) Alamri et al. (2019; Khanna and Kaur, 2019; Hameed et al., 2019; Al-Sharekh and Al-Shqeerat, 2019; Yaqoob et al., 2019; Nord et al., 2019; Grammatikis et al., 2019; Hou et al., 2019; Mohamad Noor and Hassan, 2019; Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Table 4: Continue Availability Non-repudiation Access control Inter-operability Sisinni et al., 2018; Chen et al., 2018; Sun et al., 2018; Sha et al., 2018; Atlam et al., 2018; Forsstrom et al., 2018; Ali et al., 2020; Ni et al., 2018; Yu et al., 2018; Das et al., 2018; Singh et al., 2018; Omar and Basir, 2018; Reyna et al., 2018; Jeon et al., 2018; Javed et al., 2018; Banerjee et al., 2018; Li et al., 2018) Mendez Mena et al. (2018a; Chen et al., 2018; Atlam et al., 2018; Mendez Mena et al., 2018b; Ali et al., 2020) Choi et al. (2018) Conti et al. (2018; Adat and Gupta, 2018; Chen et al., 2018; Sun et al., 2018; Atlam et al., 2018; Ni et al., 2018; Yu et al., 2018) Adat and Gupta (2018; “An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges,” 2018; Sisinni et al., 2018; Jeon et al., 2018; Javed et al., 2018; Li et al., 2018) Viriyasitavat et al., 2019; Dai et al., 2019) Khanna and Kaur (2019; Al-Sharekh and Al-Shqeerat, 2019; Nord et al., 2019; Grammatikis et al., 2019) Ali et al. (2019; Hou et al., 2019; Zhang et al., 2018) (Khanna and Kaur, 2019), (Dai et al., 2019), (Noura et al., 2019) Table 5: IoT security issues future trends Issues/Era 2020 Confidentiality Perera et al. (2020; Hossain et al., 2020; Mbarek et al., 2020; Berger et al., 2020; Yin et al., 2020) Integrity Mbarek et al. (2020; Hamad et al., 2020; Berger et al., 2020; Yin et al., 2020) Authenticity Mbarek et al. (2020; Hamad et al., 2020; Berger et al., 2020; Zhang and Xu, 2020; Li et al., 2020) Authorization Berger et al. (2020) Data security privacy Yuxin Liu et al. (2020; Mbarek et al., 2020; Basahel and Yamin, 2020; Hamad et al., 2020; Berger et al., 2020; Li et al., 2020; Yang et al., 2020; Stoyanova et al., 2020b; Yu Liu et al., 2020; Lin Liu et al., 2020; Abd EL-Latif et al., 2020; Mridha et al., 2020; Mawgoud et al., 2020; Al-Emran et al., 2020) Availability Berger et al. (2020; Yin et al., 2020) Non-repudiation Access control Hamad et al. (2020; Yu Liu et al., 2020) Inter-operability Mridha et al. (2020; Khan et al., 2020) Fig. 6: Distribution of paper by IoT security threats in future Our Contribution, Limitations and Future Research Direction Several researchers have reviewed articles on security issues within IoT. Maria et-al discussed about IoT security with respect to IoT forensics and highlighted challenges and open issues (Stoyanova et al., 2020a). Another paper discussed about various security protocols implemented within IoT to ensure security within IoT (Granjal et al., 2015b). Researchers in (Neshenko et al., 2019) identified various vulnerabilities within IoT which are although same as what this study has identified such as availability, access control, authorization etc. but their analytical model is different from ours as they have segregated the reviewed articles with respect to IoT layers, security impact, countermeasures, security attacks and situational awareness capabilities after which they have discussed various remedies/solutions available in the 1038 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 literature to address these issues. This research study makes following novel contribution to the body of knowledge: a. b. c. This is the first paper to the best of our knowledge, which has surveyed papers from years 2015-2020 to analyze the past, present and future trends in IoT security issues This study has identified the most discussed security issues in last 5 years which clearly highlighted the most and the least discussed IoT security issues in the literature By identifying most and the least discussed IoT security issues, we have identified and highlighted the gap within IoT security issues which needs to be addressed in future There are a number of limitations of this research study which are: a. b. c. This study only highlighted the most and the least discussed IoT security issues in the literature but not how those security issues have been addressed by the researchers The survey has taken the most recent 5 years articles for the analysis which may provide us with the state of the art but not a comprehensive result This research paper lacks discussion about the security algorithms/protocols being used to address various IoT security issues In future, this research can be further extended into various directions with respect to IoT security issues: a. b. c. More exhaustive literature review can be carried out to understand the mechanisms, tools, algorithms and protocols to address each of the security issues within IoT There is a clear need to address the least discussed IoT security issues such as non-repudiation and inter-operability New methods, algorithms and frameworks may be developed and introduced to address the most addressed security issues that needs optimization as well as the least addressed issues Conclusion IoT is an emerging technology that provides consumer satisfaction in terms of privacy and security. In this study, we have examined past, present and future of IoT security issues trends by identifying and reviewing already addressed in IoT security vulnerabilities. As IoT is gaining more popularity among researchers and practitioners, more security issues main arise in future which needs to be addressed if we need to harness the benefits of the IoT technology. This study has done extensive literature review of the last 5 years from 2015-2020 to identify various security issues within IoT and then analyzed the trend in discussion in the literature of the identified issues with respect to past, present and future. It has been identified that in the past, “data security and privacy”, “integrity” and “confidentiality are the most discussed security issues whereas “non-repudiation”, “authorization” and “access control” are least discussed. In present and even in future, “data security and privacy” and “integrity”, “authenticity and “confidentiality” are the most discussed security issues within IoT while authorization and non-repudiation are the least discussed security issues. This research can act as a starting point for a researcher who decides to work in this imperative area of IoT security. Acknowledgement This research is funded by Universiti Kuala Lumpur (UniKL) and Centre for Research and Innovation (CORI). Funding Information This work was supported by the Universiti Kuala Lumpur, Malaysia, through the Short Term Research Grant (STRG) and Center of Research and Innovation (CORI). Author’s Contributions Every author has equal contribution in this research. Ethics This research paper is genuine and all authors have read it thoroughly and approved that it does not contain any material which is already published. In this article no ethical issues are involved. References Abd EL-Latif, A. A., Abd-El-Atty, B., & Abou-Nassar, E. M., Venegas-Andraca, S. E., (2020). Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things. Optics & Laser Technology 124, 105942. doi.org/10.1016/j.optlastec.2019.105942 Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65-88. https://journals.riverpublishers.com/index.php/JCSAN DM/article/view/6087 Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: issues, challenges, taxonomy and architecture. Telecommunication Systems, 67(3), 423-441. https://link.springer.com/article/10.1007/s11235017-0345-9 1039 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Agrawal, R., Verma, P., Sonanis, R., Goel, U., De, A., Kondaveeti, S. A., & Shekhar, S. (2018, April). Continuous security in IoT using blockchain. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 6423-6427). IEEE. doi.org/10.1109/ICASSP.2018.8462513 Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198-213. doi.org/10.1016/j.jnca.2016.03.006 Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10-28. doi.org/10.1016/j.jnca.2017.04.002 Alamri, M., Jhanjhi, N. Z., & Humayun, M. (2019). Blockchain for Internet of Things (IoT) research issues challenges & future directions: A review. Int. J. Comput. Sci. Netw. Secur, 19, 244-258. https://expert.taylors.edu.my/file/rems/publication/1 09566_6018_1.pdf Al-Emran, M., Malik, S. I., & Al-Kabi, M. N. (2020). A survey of internet of things (IoT) in education: Opportunities and challenges. Toward social internet of things (SIoT): Enabling technologies, architectures and applications, 197-209. doi.org/10.1007/978-3-030-24513-9_12 Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. arXiv preprint arXiv:1901.07309. https://arxiv.org/abs/1901.07309 Ali, J., Ali, T., Musa, S., & Zahrani, A. (2020). Towards secure IoT communication with smart contracts in a blockchain infrastructure. arXiv preprint arXiv:2001.01837. doi.org/10.14569/IJACSA.2018.091070 Almotiri, S. H., Khan, M. A., & Alghamdi, M. A. (2016, August). Mobile health (m-health) system in the context of IoT. In 2016 IEEE 4th international conference on future internet of things and cloud workshops (FiCloudW) (pp. 39-42). IEEE. doi.org/10.1109/W-FiCloud.2016.24 Alphand, O., Amoretti, M., Claeys, T., Dall'Asta, S., Duda, A., Ferrari, G., ... & Zanichelli, F. (2018, April). IoTChain: A blockchain security architecture for the Internet of Things. In 2018 IEEE wireless communications and networking conference (WCNC) (pp. 1-6). IEEE. doi.org/10.1109/WCNC.2018.8377385 Alsaadi, E., & Tubaishat, A. (2015). Internet of things: Features, challenges and vulnerabilities. International Journal of Advanced Computer Science and Information Technology, 4(1), 1-13. http://elvedit.com/journals/IJACSIT/wpcontent/uploads/2015/02/internet-of-things.pdf Al-Sharekh, S. I., & Al-Shqeerat, K. H. (2020, February). An Overview of Privacy Issues in IoT Environments. In 2019 International Conference on Advances in the Emerging Computing Technologies (AECT) (pp. 1-6). IEEE. doi.org/10.1109/AECT47998.2020.9194197 Amadeo, M., Campolo, C., Quevedo, J., Corujo, D., Molinaro, A., Iera, A., ... & Vasilakos, A. V. (2016). Information-centric networking for the internet of things: Challenges and opportunities. IEEE Network, 30(2), 92-100. doi.org/10.1109/MNET.2016.7437030 Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things: Security vulnerabilities and challenges. In 2015 IEEE symposium on computers and communication (ISCC) (pp. 180-187). IEEE. doi.org/10.1109/ISCC.2015.7405513 Arias, O., Wurm, J., Hoang, K., & Jin, Y. (2015). Privacy and security in internet of things and wearable devices. IEEE Transactions on Multi-Scale Computing Systems, 1(2), 99-109. doi.org/10.1109/TMSCS.2015.2498605 Atlam, H. F., Alenezi, A., Alharthi, A., Walters, R. J., & Wills, G. B. (2017, June). Integration of cloud computing with internet of things: Challenges and open issues. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 670-675). IEEE. doi.org/10.1109/iThingsGreenCom-CPSCom-SmartData.2017.105 Atlam, H. F., Walters, R. J., & Wills, G. B. (2018, August). Internet of nano things: Security issues and applications. In Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing (pp. 71-77). doi.org/10.1145/3264560.3264570 Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges and opportunities. IEEE Access, 5, 26521-26544. doi.org/10.1109/ACCESS.2017.2775180 Banerjee, M., Lee, J., & Choo, K. K. R. (2018). A blockchain future for internet of things security: a position paper. Digital Communications and Networks, 4(3), 149-160. doi.org/10.1016/j.dcan.2017.10.006 Basahel, A. M., & Yamin, M. (2020). Cyber Security and Privacy in Internet of Things. International Journal of Human Potentials Management, 2(1), 43-53. http://abmjournal.org/index.php/ijhpm/article/view/26 Basu, S. S., Tripathy, S., & Chowdhury, A. R. (2015, May). Design challenges and security issues in the Internet of Things. In 2015 IEEE Region 10 Symposium (pp. 90-93). IEEE. doi.org/10.1109/TENSYMP.2015.25 Berger, S., Bürger, O., & Röglinger, M. (2020). Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy. Computers & Security, 93, 101790. doi.org/10.1016/j.cose.2020.101790 1040 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Billure, R., Tayur, V. M., & Mahesh, V. (2015, June). Internet of Things-a study on the security challenges. In 2015 IEEE International Advance Computing Conference (IACC) (pp. 247-252). IEEE. doi.org/10.1109/IADCC.2015.7154707 Breivold, H. P., & Sandström, K. (2015, December). Internet of things for industrial automation-challenges and technical solutions. In 2015 IEEE International Conference on Data Science and Data Intensive Systems (pp. 532-539). IEEE. doi.org/10.1109/DSDIS.2015.11 Chen, H., Pendleton, M., Njilla, L., & Xu, S. (2019). A survey on Ethereum systems security: Vulnerabilities, attacks and defenses. arXiv preprint arXiv:1908.04507. https://arxiv.org/abs/1908.04507 Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., & Jin, Y. (2018). Internet-of-things security and vulnerabilities: Taxonomy, challenges and practice. Journal of Hardware and Systems Security, 2(2), 97-110. https://link.springer.com/article/10.1007/s41635017-0029-7 Choi, S. S., Burm, J. W., Sung, W., Jang, J. W., & Reo, Y. J. (2018, June). A blockchain-based secure iot control scheme. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) (pp. 74-78). IEEE. doi.org/10.1109/ICACCE.2018.8441717 Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. doi.org/10.1016/j.future.2017.07.060 Dai, H. N., Zheng, Z., & Zhang, Y. (2019). Blockchain for Internet of Things: A survey. IEEE Internet of Things Journal, 6(5), 8076-8094. doi.org/10.1109/JIOT.2019.2920987 Das, A.K., Zeadally, S., He, D., 2018. Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems 89, 110–125. doi.org/10.1016/j.future.2018.06.027 Elijah, O., Rahman, T. A., Orikumhi, I., Leow, C. Y., & Hindia, M. N. (2018). An overview of Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE Internet of Things Journal, 5(5), 3758-3773. doi.org/10.1109/JIOT.2018.2844296 Elkhodr, M., Shahrestani, S., & Cheung, H. (2016). The internet of things: New interoperability, management and security challenges. arXiv preprint arXiv:1604.04824. doi.org/10.5121/ijnsa.2016.8206 Fakhri, D., & Mutijarsa, K. (2018, October). Secure IoT communication using blockchain technology. In 2018 International Symposium on Electronics and Smart Devices (ISESD) (pp. 1-6). IEEE. doi.org/10.1109/ISESD.2018.8605485 Farooq, M. U., Waseem, M., Mazhar, S., Khairi, A., & Kamal, T. (2015). A review on internet of things (IoT). International journal of computer applications, 113(1), 1-7. file:///C:/Users/123/Downloads/56%20(1).pdf Fersi, G. (2015, June). Middleware for internet of things: A study. In 2015 International Conference on Distributed Computing in Sensor Systems (pp. 230235). IEEE. doi.org/10.1109/DCOSS.2015.43 Forsström, S., Butun, I., Eldefrawy, M., Jennehag, U., & Gidlund, M. (2018, April). Challenges of securing the industrial internet of things value chain. In 2018 Workshop on Metrology for Industry 4.0 and IoT (pp. 218-223). IEEE. doi.org/10.1109/METROI4.2018.8428344 Gaikwad, P. P., Gabhane, J. P., & Golait, S. S. (2015, April). A survey based on Smart Homes system using Internet-of-Things. In 2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) (pp. 0330-0335). IEEE. doi.org/10.1109/ICCPEIC.2015.7259486 Gil, D., Ferrández, A., Mora-Mora, H., & Peral, J. (2016). Internet of things: A review of surveys based on context aware intelligent services. Sensors, 16(7), 1069. /doi.org/10.3390/s16071069 Grammatikis, P. I. R., Sarigiannidis, P. G., & Moscholios, I. D. (2019). Securing the Internet of Things: Challenges, threats and solutions. Internet of Things, 5, 41-70. doi.org/10.1016/j.iot.2018.11.003 Granjal, J., Monteiro, E., & Silva, J. S. (2015a). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312. doi.org/10.1109/COMST.2015.2388550 Granjal, J., Monteiro, E., & Sa Silva, J., (2015b). Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communications Surveys & Tutorials 17, 1294– 1312. doi.org/10.1109/COMST.2015.2388550 Guarda, T., Leon, M., Augusto, M. F., Haz, L., De la Cruz, M., Orozco, W., & Alvarez, J. (2017, June). Internet of Things challenges. In 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-4). IEEE. doi.org/10.23919/CISTI.2017.7975936 Gupta, K., & Shukla, S. (2016, February). Internet of Things: Security challenges for next generation networks. In 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) (pp. 315-318). IEEE. doi.org/10.1109/ICICCS.2016.7542301 Ali, Z. H., Ali, H. A., & Badawy, M. M. (2015). Internet of Things (IoT): Definitions, challenges and recent research directions. International Journal of Computer Applications, 128(1), 37-47. 1041 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Hamad, S. A., Sheng, Q. Z., Zhang, W. E., & Nepal, S. (2020). Realizing an internet of secure things: A survey on issues and enabling technologies. IEEE Communications Surveys & Tutorials, 22(2), 1372-1391. doi.org/10.1109/COMST.2020.2976075 Hameed, S., Khan, F. I., & Hameed, B. (2019). Understanding security requirements and challenges in Internet of Things (IoT): A review. Journal of Computer Networks and Communications, 2019. doi.org/10.1155/2019/9629381 Hassan, R., Qamar, F., Hasan, M. K., Aman, A. H. M., & Ahmed, A. S. (2020). Internet of Things and its applications: A comprehensive survey. Symmetry, 12(10), 1674 doi.org/10.3390/sym12101674 Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283-294. doi.org/10.1016/j.comnet.2018.11.025 Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges and open problems in the internet of things. In 2015 ieee world congress on services (pp. 21-28). IEEE. doi.org/10.1109/SERVICES.2015.12 Hossain, M. S., Waheed, S., Rahman, Z., Shezan, S. K. A., & Hossain, M. M. (2020). Blockchain for the security of Internet of Things: A smart home use case using Ethereum. International Journal of Recent Technology and Engineering, 8(5), 4601-4608. Hou, J., Qu, L., & Shi, W. (2019). A survey on internet of things security from data perspectives. Computer Networks, 148, 295-306. doi.org/10.1016/j.comnet.2018.11.026 Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The internet of things for health care: A comprehensive survey. IEEE access, 3, 678-708. doi.org/10.1109/ACCESS.2015.2437951 Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoT) operating systems support, networking technologies, applications and challenges: A comparative review. IEEE Communications Surveys & Tutorials, 20(3), 2062-2100. doi.org/10.1109/COMST.2018.2817685 Jeon, K. E., She, J., Soonsawad, P., & Ng, P. C. (2018). Ble beacons for internet of things applications: Survey, challenges and opportunities. IEEE Internet of Things Journal, 5(2), 811-828. doi.org/10.1109/JIOT.2017.2788449 Khadam, U., Iqbal, M. M., Alruily, M., Al Ghamdi, M. A., Ramzan, M., & Almotiri, S. H. (2020). Text data security and privacy in the internet of things: Threats, challenges and future directions. Wireless Communications and Mobile Computing, 2020. doi.org/10.1155/2020/7105625 Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions and open challenges. Future generation computer systems, 82, 395-411. doi.org/10.1016/j.future.2017.11.022 Khan, W. Z., Rehman, M. H., Zangoti, H. M., Afzal, M. K., Armi, N., & Salah, K. (2020). Industrial internet of things: Recent advances, enabling technologies and open challenges. Computers & Electrical Engineering, 81, 106522. doi.org/10.1016/j.compeleceng.2019.106522 Khanna, A., & Kaur, S. (2019). Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture. Computers and electronics in agriculture, 157, 218-231. doi.org/10.1016/j.compag.2018.12.039 Kolias, C., Stavrou, A., Voas, J., Bojanova, I., & Kuhn, R. (2016). Learning Internet-of-Things security" hands-on". IEEE Security & Privacy, 14(1), 37-46. doi.org/10.1109/MSP.2016.4 Kumar, S. A., Vealey, T., & Srivastava, H. (2016, January). Security in internet of things: Challenges, solutions and future directions. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5772-5781). IEEE. doi.org/10.1109/HICSS.2016.714 Li, J., Zhang, Z., Hui, L., & Zhou, Z. (2020). A Novel Message Authentication Scheme With Absolute Privacy for the Internet of Things Networks. IEEE Access, 8, 39689-39699. doi.org/10.1109/ACCESS.2020.2976161 Li, S., Da Xu, L., & Zhao, S. (2018). 5G Internet of Things: A survey. Journal of Industrial Information Integration, 10, 1-9. doi.org/10.1016/j.jii.2018.01.005 Liu, L., Su, J., Zhao, B., Wang, Q., Chen, J., & Luo, Y. (2020a). Towards an efficient privacy-preserving decision tree evaluation service in the Internet of Things. Symmetry, 12(1), 103. doi.org/10.3390/sym12010103 Liu, Y., Xue, K., He, P., Wei, D. S., & Guizani, M. (2020b). An Efficient, Accountable and PrivacyPreserving Access Control Scheme for Internet of Things in a Sharing Economy Environment. IEEE Internet of Things Journal, 7(7), 6634-6646. doi.org/10.1109/JIOT.2020.2975140 Liu, Y., Ma, M., Liu, X., Xiong, N. N., Liu, A., & Zhu, Y. (2018). Design and analysis of probing route to defense sink-hole attacks for Internet of Things security. IEEE Transactions on Network Science and Engineering, 7(1), 356-372. doi.org/10.1109/TNSE.2018.2881152 Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 336-341). IEEE. doi.org/10.1109/ICITST.2015.7412116 Maras, M. H. (2015). Internet of Things: Security and privacy implications. International Data Privacy Law, 5(2), 99. researchgate.net/profile/Marie-HelenMaras/publication/275228804_Internet_of_Things_s ecurity_and_privacy_implications/links/586d4dfa08 ae329d62138f0a/Internet-of-Things-security-andprivacy-implications.pdf 1042 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Mawgoud, A. A., Taha, M. H. N., & Khalifa, N. E. M. (2020). Security threats of social internet of things in the higher education environment. In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications (pp. 151-171). Springer, Cham. doi.org/10.1007/978-3-030-24513-9_9 Mbarek, B., Ge, M., & Pitner, T. (2020). An efficient mutual authentication scheme for internet of things. Internet of Things, 9, 100160. doi.org/10.1016/j.iot.2020.100160 Mehmood, Y., Ahmad, F., Yaqoob, I., Adnane, A., Imran, M., & Guizani, S. (2017). Internet-of-things-based smart cities: Recent advances and challenges. IEEE Communications Magazine, 55(9), 16-24. doi.org/10.1109/MCOM.2017.1600514 Mendez Mena, D., Papapanagiotou, I., & Yang, B. (2018). Internet of things: Survey on security. Information Security Journal: A Global Perspective, 27(3), 162-182. doi.org/10.1080/19393555.2018.1458258 Miloslavskaya, N., & Tolstoy, A. (2019). Internet of things: information security challenges and solutions. Cluster Computing, 22(1), 103-119. https://link.springer.com/article/10.1007/s10586018-2823-6 Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on emerging topics in computing, 5(4), 586-602. doi.org/10.1109/TETC.2016.2606384 Mridha, M. F., Hamid, M. A., & Asaduzzaman, M. (2020). Issues of Internet of Things (IoT) and an intrusion detection system for IoT using machine learning paradigm. In Proceedings of International Joint Conference on Computational Intelligence (pp. 395-406). Springer, Singapore. doi.org/10.1007/978-981-13-7564-4_34 Nalbandian, S. (2015, November). A survey on Internet of Things: Applications and challenges. In 2015 International Congress on Technology, Communication and Knowledge (ICTCK) (pp. 165-169). IEEE. doi.org/10.1109/ICTCK.2015.7582664 Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702-2733. doi.org/10.1109/COMST.2019.2910750 Nord, J. H., Koohang, A., & Paliszkiewicz, J. (2019). The Internet of Things: Review and theoretical framework. Expert Systems with Applications, 133, 97-108. doi.org/10.1016/j.eswa.2019.05.014 Noura, M., Atiquzzaman, M., & Gaedke, M. (2019). Interoperability in internet of things: Taxonomies and open challenges. Mobile Networks and Applications, 24(3), 796-809. https://link.springer.com/article/10.1007/s11036018-1089-9 Omar, A. S., & Basir, O. (2018, July). Identity management in IoT networks using blockchain and smart contracts. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 994-1000). IEEE. doi.org/10.1109/Cybermatics_2018.2018.00187 Ouaddah, A., Mousannif, H., Abou Elkalam, A., & Ouahman, A. A. (2017). Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, 237-262. doi.org/10.1016/j.comnet.2016.11.007 Perera, C., Barhamgi, M., Bandara, A. K., Ajmal, M., Price, B., & Nuseibeh, B. (2020). Designing privacy-aware internet of things applications. Information Sciences, 512, 238-257. doi.org/10.1016/j.ins.2019.09.061 Perera, C., Liu, C. H., & Jayawardena, S. (2015). The emerging internet of things marketplace from an industrial perspective: A survey. IEEE transactions on emerging topics in computing, 3(4), 585-598. doi.org/10.1109/TETC.2015.2390034 Pescatore, J., & Shpantzer, G. (2014). Securing the internet of things survey. SANS Institute, 1-22. file:///C:/Users/PC/Downloads/securing-internetthings-survey-34785.pdf Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 88, 173-190. doi.org/10.1016/j.future.2018.05.046 Sadeeq, M. A., Zeebaree, S. R., Qashi, R., Ahmed, S. H., & Jacksi, K. (2018, October). Internet of Things security: a survey. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 162-166). IEEE. doi.org/10.1109/ICOASE.2018.8548785 Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6). IEEE. doi.org/10.1145/2744769.2747942. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137. doi.org/10.1016/j.dcan.2017.04.003 Sha, K., Wei, W., Yang, T. A., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future Generation Computer Systems, 83, 326-337. doi.org/10.1016/j.future.2018.01.059 Shafiq, M., Zhang, Q., Akbar, M. A., Alsanad, A., & Mahmood, S. (2020). Factors influencing the requirements engineering process in offshore software development outsourcing environments. IET Software, 14(6), 623-637. https://ieeexplore.ieee.org/document/9278577/ 1043 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Shah, S. H., & Yaqoob, I. (2016, August). A survey: Internet of Things (IOT) technologies, applications and challenges. In 2016 IEEE Smart Energy Grid Engineering (SEGE) (pp. 381-385). IEEE. doi.org/10.1109/SEGE.2016.7589556 Sicari, S., Rizzardi, A., Grieco, L.A., & Coen-Porisini, A., (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76, 146–164. doi.org/10.1016/j.comnet.2014.11.008 Sicari, S., Rizzardi, A., Miorandi, D., & Coen-Porisini, A. (2016, November). Internet of Things: Security in the keys. In Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks (pp. 129-133). doi.org/10.1145/2988272.2988280 Singh, M., Singh, A., & Kim, S. (2018, February). Blockchain: A game changer for securing IoT data. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) (pp. 51-55). IEEE. doi.org/10.1109/WF-IoT.2018.8355182 Singh, S., & Singh, N. (2015, October). Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 1577-1581). Ieee. doi.org/10.1109/ICGCIoT.2015.7380718 Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund, M. (2018). Industrial internet of things: Challenges, opportunities and directions. IEEE transactions on industrial informatics, 14(11), 4724-4734. doi.org/10.1109/TII.2018.2852491 Sood, K., Yu, S., & Xiang, Y. (2015). Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review. IEEE Internet of Things Journal, 3(4), 453-463. doi.org/10.1109/JIOT.2015.2480421 Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464. doi.org/10.1016/j.jclepro.2016.10.006 Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020a). A survey on the internet of things (IoT) forensics: Challenges, approaches and open issues. IEEE Communications Surveys & Tutorials, 22(2), 1191-1221. doi.org/10.1109/COMST.2019.2962586 Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K., (2020b). A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues. IEEE Communications Surveys & Tutorials 1-1. https://doi.org/10.1109/comst.2019.2962586 Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: a review. Security and Communication Networks, 2018. doi.org/10.1155/2018/5978636 Tzounis, A., Katsoulas, N., Bartzanas, T., & Kittas, C. (2017). Internet of Things in agriculture, recent advances and future challenges. Biosystems engineering, 164, 31-48. doi.org/10.1016/j.biosystemseng.2017.09.007 Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., & Kikiras, P. (2015, September). On the security and privacy of Internet of Things architectures and systems. In 2015 International Workshop on Secure Internet of Things (SIoT) (pp. 49-57). IEEE. doi.org/10.1109/SIOT.2015.9 Viriyasitavat, W., Anuphaptrirong, T., & Hoonsopon, D. (2019). When blockchain meets Internet of Things: Characteristics, challenges and business opportunities. Journal of industrial information integration, 15, 21-28. doi.org/10.1016/j.jii.2019.05.002 Wang, S., Yuan, Y., Wang, X., Li, J., Qin, R., & Wang, F. Y. (2018, June). An overview of smart contract: Architecture, applications and future trends. In 2018 IEEE Intelligent Vehicles Symposium (IV) (pp. 108-113). IEEE. doi.org/10.1109/IVS.2018.8500488 Weber, M., & Boban, M. (2016, May). Security challenges of the internet of things. In 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 638-643). IEEE. doi.org/10.1109/MIPRO.2016.7522219 Weber, R. H. (2015). Internet of things: Privacy issues revisited. Computer Law & Security Review, 31(5), 618-627. doi.org/10.1016/j.clsr.2015.07.002 Whitmore, A., Agarwal, A., Da Xu, L., 2015. The Internet of Things-A survey of topics and trends. Information Systems Frontiers 17, 261–274. https://link.springer.com/article/10.1007%2Fs10796 -014-9489-2 Yang, P., Kang, X., Wu, Q., Yang, B., & Zhang, P. (2020). Participant selection strategy with privacy protection for internet of things search. IEEE Access, 8, 40966-40976. doi.org/10.1109/ACCESS.2020.2976614 Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., & Guizani, M. (2017a). Internet of things architecture: Recent advances, taxonomy, requirements and open challenges. IEEE wireless communications, 24(3), 10-16. doi.org/10.1109/MWC.2017.1600421 Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., & Guizani, M. (2017b). The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, 444-458. doi.org/10.1016/j.comnet.2017.09.003 1044 Imran et al. / Journal of Computer Science 2021, 17 (11): 1031.1045 DOI: 10.3844/jcssp.2021.1031.1045 Yaqoob, I., Hashem, I. A. T., Ahmed, A., Kazmi, S. A., & Hong, C. S. (2019). Internet of things forensics: Recent advances, taxonomy, requirements and open challenges. Future Generation Computer Systems, 92, 265-275. doi.org/10.1016/j.future.2018.09.058 Yin, L., Fang, B., Guo, Y., Sun, Z., & Tian, Z. (2020). Hierarchically defining Internet of Things security: From CIA to CACA. International Journal of Distributed Sensor Networks, 16(1), 1550147719899374. doi.org/10.1177/1550147719899374 Yu, Y., Li, Y., Tian, J., & Liu, J. (2018). Blockchainbased solutions to security and privacy issues in the internet of things. IEEE Wireless Communications, 25(6), 12-18. doi.org/10.1109/MWC.2017.1800116 Zaslavsky, A., & Georgakopoulos, D. (2015, June). Internet of things: Challenges and state-of-the-art solutions in internet-scale sensor information management and mobile analytics. In 2015 16th IEEE International Conference on Mobile Data Management (Vol. 2, pp. 3-6). IEEE. doi.org/10.1109/MDM.2015.72 Zhang, Q., & Xu, D. (2020). Security authentication technology based on dynamic Bayesian network in Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 11(2), 573-580. https://link.springer.com/article/10.1007/s12652018-0949-2 Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2018). Smart contract-based access control for the internet of things. IEEE Internet of Things Journal, 6(2), 1594-1605. doi.org/10.1109/JIOT.2018.2847705 1045