0% found this document useful (0 votes)
8 views

001_2022_IoT Security Review A Case Study of IIoT, IoV, and Smart Home

The review article discusses the security challenges in the Internet of Things (IoT), focusing on three key areas: Industrial IoT (IIoT), Internet of Vehicles (IoV), and smart homes. It highlights the importance of addressing security vulnerabilities in these domains to facilitate the broader adoption of IoT technologies. The paper also outlines current security technologies and future research directions to enhance IoT security across these application scenarios.

Uploaded by

m.nour2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

001_2022_IoT Security Review A Case Study of IIoT, IoV, and Smart Home

The review article discusses the security challenges in the Internet of Things (IoT), focusing on three key areas: Industrial IoT (IIoT), Internet of Vehicles (IoV), and smart homes. It highlights the importance of addressing security vulnerabilities in these domains to facilitate the broader adoption of IoT technologies. The paper also outlines current security technologies and future research directions to enhance IoT security across these application scenarios.

Uploaded by

m.nour2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Hindawi

Wireless Communications and Mobile Computing


Volume 2022, Article ID 6360553, 10 pages
https://doi.org/10.1155/2022/6360553

Review Article
IoT Security Review: A Case Study of IIoT, IoV, and Smart Home

Jinnan Ma, Xuekui Shangguan, and Ying Zhang


Shanxi Information Industry Technology Research Institute Co., Ltd, Taiyuan 030012, China

Correspondence should be addressed to Ying Zhang; [email protected]

Received 18 May 2022; Revised 17 July 2022; Accepted 25 July 2022; Published 21 August 2022

Academic Editor: Chao Zhang

Copyright © 2022 Jinnan Ma et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the
interconnection of individuals, things, and machines at any place and time and improve the function performance of network
applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT
technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary
emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these
three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart
home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and
discussed several future outlook of challenges and development trends for the IoT technology.

1. Introduction to the Internet. On November 17, 2005, the International


Telecommunication Union [6] published the “ITU Internet
IoT generally refers to the use of diverse information sen- Report 2005: Internet of Things,” which formally put for-
sors, radio wave identification technology, laser scanners, ward the notion of “Internet of Things.”
infrared sensors, global positioning system, and other equip- With the sound growth of IoT industries, it has gradually
ment to realize actual acquisition of data that need to be penetrated into all aspects of life [7]. IoT has effectively pro-
interacted, connected, and recorded [1]. The data collected moted the intelligent development of infrastructures and
by IoT devices include diverse necessary information such day-to-day life such as industries, transportation, homes,
as light, biology, heat, sound, electricity, chemistry, mechan- and cities, making limited resources more rationally allo-
ics, and other position information. By connecting the above cated, and greatly improved the quality of human life [8,
information to the Internet, one can achieve intelligent per- 9]. However, whereas IoT technologies bring convenience
ception, identification, and management. The Internet of to people’s lives, some security concerns also appear. Secu-
Things is an extension and expansion network based on rity is the most concerned factor when enterprises consider
the Internet. Through the traditional telecommunication deploying IoT systems, and most of them temporarily shelve
network, the respectively addressed public physical objects their plans to deploy IoT because of these security concerns,
are interconnected. Therefore, it is an important part of which hinders the rising trend of IoT and has greatly
the emerging information technology [2]. Moreover, the affected the popularization and development of IoT [7].
extreme expansion and extension of the Internet is another Therefore, IoT will only enter the realistic outbreak stage
typical revolution in the information industry after the after breaking through the bottleneck of this security issues.
emergence of computers and the Internet. Therefore, it is Thus, the development of security and privacy techniques
often named “Internet where everything is connected” and plays a significant place in promoting IoT technologies [10].
“The third wave of the world information industry” [3, 4]. In recent years, the three fields of IIoT security, IoV
As early as 1999, Ashton [5], from MIT Auto-ID Research security [11], and smart home security are relatively popular
Center, first put forward the notion of IoT when he studied and occupy a large market share. In light of the above anal-
the connection of radio frequency identification information ysis, security research in the field of IoT exists in the
2 Wireless Communications and Mobile Computing

direction of IIoT, IoV, and smart home. Therefore, this 2. The Security of IIoT
paper will systematically sort out the security issues in these
three fields, respectively. We briefly sum up the three aspects With the deep integration of industrialization and informa-
below. tization, the interconnection of production control systems
and production management systems within various enter-
1.1. The Security of IIoT. IIoT refers to the use of automated, prises is increasing nowadays, and the need to improve
interconnected sensors, devices, and machinery to drive product qualities and operational efficiencies by accessing
operational efficiencies at an industrial scale. Many IIoT- networks is stronger as well. As a result, IIoT was born that
related security issues can be traced back to a lack of basic acts as a relevant degree of integration of the Internet and
security protections, such as exposed ports, outdated soft- industrial systems, as well as advanced computing, analysis,
ware applications, and shallow authentication. These vulner- and sensing technologies. IIoT integrates industrial monitor-
abilities directly connect to the network and provide a ing systems, material transportation systems, industrial pro-
breach for a saboteur to gain easy access to the entire system. duction systems, consumer feedback information systems,
IIoT systems usually combine information technology with industrial management systems, etc. and guides industrial
operational technology which adds another layer of potential production and improves efficiency by means of the intelli-
threats [12, 13]. gent processing results of diverse data centers [13].
The continuous deepening of IIoT in manufacturing
1.2. The Security of IoV. IoV means the dynamic mobile applications means that the networked devices at the factory
communication system in which vehicles and roads, vehicles equipment layer will realize automatic communication and
and vehicles, vehicles and individuals, and vehicles and sens- will be closely connected with the market layer and factory
ing devices interact to achieve the communication between management. However, increasingly networked industrial
vehicles and public networks. At present, IoV has become a environments make industrial control systems, networked
significant application scenario of IoT and 5G networks devices, and industrial clouds more vulnerable to attackers,
[11]. For IoV, how to prevent vehicle information from being leading to threats such as plant downtime and operational
modified and ensure the security and IoV data sharing is a disruption. Therefore, modern smart factories urgently need
major topic in the development of intelligent driving technol- to take measures from the system, software, hardware, and
ogies. In light of the above analysis, ensuring the availability, other levels to handle increasingly complex industrial net-
reliability, real time, and comprehensiveness of data informa- work security threats [15]. In recent years, based on the fre-
tion has become a key study topic in this field [14]. quent occurrence of industrial IoT security incidents,
information and network security issues have become a
1.3. The Security of Smart Home. Smart home means the major obstacle to the promotion and application of IIoT [16].
comprehensive application of wireless network communica-
tion technologies and sensing technologies to furniture The architecture of IIoT is primarily separated into the
household appliances, and it is an important part of IoT perception layer, network layer, and application layer [16].
and smart home. Security issues act as a key factor hindering For the protection of perception layers, related information
the growth of the smart home industry as well [10]. Since can be prevented from being obtained at the source, which
smart home products collect a large amount of private data makes the IoT system secure at the source. At this stage,
from family members, many homeowners are worried about the security risks faced by IIoT mainly include network data
network security loopholes in connected smart home security threats, hardware equipment security risks, software
devices. Therefore, a safe, stable, and reliable smart home system vulnerability risks, and IoT’s own security risks
information security technology is the focus of existing [17–19]. This means to fundamentally break through the
researches. security bottleneck of IIoT is the primary challenge to the
In light of the above analysis, there are many types of adoption of IIoT. Moreover, the framework of this section
security researches in the IoT field, relevant problems are is shown in Figure 2.
complex, and there are relatively few systematic summaries
in this field [12]. Therefore, this paper focuses on the three 2.1. IIoT Hardware Security. The growing number of IoT
fields of IIoT, IoV, and smart home and focuses on IoT in devices has increased the area of system attacks, and these
various scenarios and security issues. devices often own vulnerabilities which are opaque to the
The arrangement of the paper is listed below: Section 2 user yet may be exploited. The hardware devices of IIoT
analyzes the security of IIoT, mainly including the applica- require multifaceted protection of the system back-end and
tion of hardware securities, data securities, and blockchain the device itself [20]. Enterprises often organize a hardware
technologies. Section 3 introduces the application of data device department and a back-end department to jointly
securities, blockchain technologies, and trust management solve the security problems of IIoT.
technologies in the security of IoV. Section 4 illustrates the The security risk of IIoT hardware equipment is the big-
application of network securities, system securities, and gest problem facing the device layer for the basic operation
blockchain technologies in the field of smart home. Conclu- of IIoT. This includes not only the growing number of new
sions and future research directions are summed up for equipment, but also the need to support older industrial
these three areas in the last section. Moreover, the overall control systems [21]. The continuous growth of devices has
framework of this paper is listed in Figure 1. greatly increased the risk of system intrusion. Some older
Wireless Communications and Mobile Computing 3

IIoT hardware security

IIoT data security


The security of IIoT
Blockchain-technology-based IIoT security

Future research directions for IIoT

IoV data security

Blockchain-based IoV security


Overview of IoT
The security of IoV
security analysis
Trust-management-based IoV security

The future research direction of IoV

Smart home network security

Smart home systems security


The security of
smart home Blockchain-based smart home security

Future directions of smart home

Figure 1: Overall structure roadmap.

The security of IIoT

IIoT hardware IIoT data Blockchain-technology- Future research


security security based IIoT security directions for IIoT

Figure 2: Industrial IoT security research architecture.

devices that have weak computing and storage capabilities 2.3. Blockchain Technology-Based IIoT Security. It is noticed
are easy to be attacked [22]. Moreover, some of the relevant that classical security technologies are not suitable for IoT
literature is summarized as follows; please see Table 1. since topology and resource constraints of IoT. Blockchain
owns the feature of data traceability, decentralization, pro-
2.2. IIoT Data Security. From the beginning, IIoT owns the grammability, security, and trustworthiness and can provide
characteristics of high interconnectivity, huge network new ideas for IoT security issues. The blockchain likes a
scales, and higher risks than IoT. One of the biggest issues database ledger, which can depict all transaction records,
of IoT is to ensure the security of network, data, and devices. and the characteristics of completely saving all transaction
Protecting IIoT is a multifaceted work, and its security needs records make it impossible for anyone to cheat. Simply
to be considered in all aspects [24]. put, the blockchain is a machine that creates trust, a safe
A complete IIoT system has tens of thousands of “data and credible machine [28], which allows people who do
nodes.” Once a node is breached and infiltrated, the damage not trust each other to exchange information safely without
will spread through the node network at a high speed, which the coordination of an authoritative intermediate institution.
will have a big influence on the entire system. As of today, The blockchain system network is a classical P2P net-
the IIoT field is full of risks from the perspective of informa- work with distributed heterogeneous features, whereas IIoT
tion securities. Hackers often attack IIoT applications also has distributed characteristics. IIoT realizes information
through system vulnerabilities to destroy the system or steal exchange by applying technologies such as intelligent per-
data [25]. Therefore, from the perspective of IIoT and indus- ception and identification technology [26] and also meets
trial big data security issues, it is crucial to protect the net- operation requirements and the deployment of blockchain
work from the device layer where the data is generated. systems. The network features of the two ones determine
Data protection is a concern of the entire organization, and that the IIoT can take the merits of the advantages of block-
the more complex the network, the greater the need for data chain techniques to solve the pain points of IIoT.
protection [26]. All in all, IIoT data security requires Due to the integration of multiple systems, multiple plat-
changes big and small to ensure that networks, systems, data, forms, and multiple devices, IIoT determines that it must
and devices are protected. Moreover, some of the relevant coordinate the use of a variety of different data transmission
literature is summarized as follows, as shown in Table 2. methods and transmission protocols and open-related ports.
4 Wireless Communications and Mobile Computing

Table 1: Distribution papers in the field of IIoT hardware security.

Author Title Contributions


Hardware-security technologies for industrial IoT:
Lesjak et al. [20] Developed the TrustZone-based approach
TrustZone and security controller
Ensuring trust and security in the industrial IoT: the
Huberman [21] Presented a zero knowledge protocol
Internet of things (ubiquity symposium)
Industrial-IoT-hardware security-improvement Proposed the new system that is to deal with the manual
Basheer et al. [22]
using plan load optimization method in cloud arrival of more industrial defects
Explored four key challenges in data security of edge
Yu et al. [23] Toward data security in edge intelligent IIoT intelligent IIoT, i.e., convenient usage, reliable storage,
efficient search, and secure deletion

Table 2: Distribution papers in the field of IIoT data security.

Author Title Contributions


Used a broker-based data exchange infrastructure
Lesjak et al. [24] Security in industrial IoT-quo vadis?
and hardware-based security
Safety and security measurement in industrial
Rajmohan and Proposed a system design via employing the
environment based on smart IOT technology based
Srinivasan. [25] augmented data recognizing algorithm
augmented data recognizing scheme
Content caching in industrial IoT: security and Explored the optimum location for the TCNs and
Zahed et al. [26]
energy considerations found secured routes
Mosteiro-Sanchez Securing IIoT using defence-in-depth: towards an end-to- Presented an analysis of the most relevant security
et al. [27] end secure industry 4.0 rules

At the same time, these factors make data vulnerable to Realize the network connection of people and vehicles and roads,
threats during transmission [29]. Blockchain technology and further realize the all-round network connection between
can provide a trusted, transparent, and secure communica- vehicles and vehicles and vehicles and service platforms. The
tion channel for IIoT, enabling secure communication information transmission network structure of IoV can be
between devices. Through the decentralized verification sys- divided into three layers from low to high, i.e., the perception
tem and consensus scheme of the blockchain, the interven- layer, the transmission layer, and the application layer.
tion of illegal nodes can be avoided, and the transmitted In recent years, the development of driverless cars and 5G
data is processed by rigorous cryptography. Thus, the data technologies has enriched new fields, and IoV has gradually
security is guaranteed. Moreover, some of the relevant liter- become the development trend of the automobile industry.
ature is summarized as follows; please see Table 3. Environmental feedback redefines people’s understanding of
traditional car travels. However, with the rapid development
2.4. Future Research Directions for IIoT. Nowadays, there are of smart cars, it also raises serious challenges to the security
still serious roadblocks from an IIoT security perspective. of the existing IoV [30]. Among them, network security and
With the massive development of IIoT devices, the volume data security have become important scenarios for the sustain-
of generated data will also continue to increase, and whether able growth of the IoV industry. With the continuous expan-
the data is in edge computing, data centers, or cloud plat- sion of the commercial scale of IoV, if the transmission,
forms, all data needs to be kept safe. Therefore, in the con- collection, and use of relevant data are not effectively super-
text of the IIoT, there will need to be a greater focus on vised and regulated, and the data is allowed to flow in an
how to protect equipment, data, communication, and pro- orderly manner, a great data security risk will be formed,
cessing power far beyond the traditional confines of IT [28, and the personal information of vehicle users will be affected.
29]. With the in-depth research of blockchain technology, Therefore, the privacy protection constitutes a clear threat. At
the blockchain can be fully applied to IIoT in the future. the same time, the traditional centralized vehicle networking
model and its reliance on third-party trust authority led to
some security problems in the vehicle networking. If the cen-
3. The Security of IoV tralized authority fails, the whole system may not work prop-
IoV technology acts as an exploration of IoT. The concept of erly, reducing the availability of the system. Moreover, the
IoV originated from the combination of VANET and IoT to framework of this section is shown in Figure 3.
improve the safety of road users and reduce the number of
accidents. IoV integrates a brand-new generation of infor- 3.1. IoV Data Security. IoV is an important field of deep inte-
mation with communication technologies and takes the gration of informatization and industrialization. With the
moving vehicle as the information perception object [14]. growth of intelligent IoT technologies, the risks of IoV and
Wireless Communications and Mobile Computing 5

Table 3: Distribution papers in the field of blockchain technology-based IIoT security.

Author Title Contributions


Blockchains as security-enabler for industrial
Skwarek [28] Presented application of general blockchain mechanisms
IoT-applications
PoRX: a reputation incentive scheme for blockchain
Wang et al. [29] Explored abnormal nodes in network collaboration
consensus of IIoT

The security of IoV

IoV data Blockchain-based Trust-management-based The future research


security IoV security IoV security direction of IoV

Figure 3: IoV security research architecture.

data security have also become increasingly prominent. data security of IoV are of great significance to enhance
Whereas rapidly developing IoV technology, the United the security of IoV. However, the blockchain-based IoV
States and Europe attach great importance to the network security technology still faces many challenges when
security management, protection system construction, data showing its vitality. The inefficient block generation mech-
security, and privacy protection of the IoV life cycle [30]. anism leads to high transaction data processing latency,
In the process of using smart cars, from data collection the massive IoV data puts pressure on the storage space
to transmission, to processing and use, there are network of blockchain nodes and the security risks of blockchain
security and data security risks in the entire life cycle. Sup- itself, the underlying technology of different blockchains
pliers provide customized services to customers by collecting restricts the interconnection between multiple chains, the
information about vehicles and personnel. For instance, anonymity of user identity of blockchain hinders the
more and more manufacturers use the biometric technology tracking and tracing of network security events, and the
to collect data such as user’s driving habits and usage prefer- antitampering feature of blockchain increases the security
ences and use this data to mine and provide value-added ser- of IoV and the difficulty of content management, etc.,
vices. Therefore, the data security and network security of all urgently need to be addressed [35, 36]. Moreover,
IoV are also facing severe challenges. Once the database or some of the relevant literature is summarized as follows;
control system is hacked through the network connection, please see Table 5.
it may lead to serious consequences such as personal finger-
prints, iris, and other biometric information being stolen 3.3. Trust Management-Based IoV Security. Trust is a key
and driving routes and parameters being tampered with topic in IoV. Since the construction of IoV needs to simulta-
[31, 32]. Moreover, some of the relevant literature is summa- neously meet the large scale of data and the information sen-
rized as follows, as shown in Table 4. sitivity required by many services, it is a challenge to build a
reliable IoV system. Trust is multifaceted and may include
trust between users when automatically disseminating infor-
3.2. Blockchain-Based IoV Security. IoV technology requires mation and the trustworthiness of the IoT concept itself, etc.
secure and transparent systems. The blockchain owns the [37, 38] As IoT is decentralized, assessing its trustworthiness
feature of nontampering, decentralization, and traceability, is very challenging. Therefore, minimizing the ambiguity of
which can enhance the data privacy and security transpar- the service mode of IoV systems, clarifying the intention of
ency of entire systems. Thus, the development of blockchain information use, legally binding suppliers, and adopting
technologies can become an important boost to the data the concept of privacy by design can improve the privacy
security of IoV [33]. The nontamperable modification of security of users and promote establishment of the trust in
data by distributed storage of blockchain can permanently IoV [39].
store each group of vehicles with location and time data, In existing privacy researches based on IoV, most of them
data related to the vehicle itself, and the corresponding have adopted the ideas of blockchain technologies, federated
owner information data and the owner’s consumption learning, hybrid trust management, node credibility evalua-
habits, hobbies, and other information forever. Recorded in tion and differential privacy [40], virtual travel itineraries,
the blockchain, it can achieve the stabilization of automobile credibility and private information retrieval, etc. Moreover,
big data, solve the problems of vehicle data security and some of the relevant literature is summarized as follows, as
integrity [34], and improve the efficiency of collaborative shown in Table 6.
management between government regulatory authorities
and enterprises in the automotive industry. 3.4. The Future Research Direction of IoV. As there are enor-
The advantages of blockchain technologies and their mous personal information exchanges and information
applications to access control, communication security, and recipients in IoV, it is extremely difficult to whole network
6 Wireless Communications and Mobile Computing

Table 4: Distribution papers in the field of IoV data security.

Author Title Contributions


AnonSURP: an anonymous and secure
Shariq et al. [30] ultralightweight RFID protocol for deployment Designed an anonymous and secure RFID IoV protocol
in internet of vehicles systems
ECC based lightweight secure message conveyance
Proposed rule for secure data correspondence between
Poomagal and Kumar. [31] protocol for satellite communication in Internet of
vehicular nodes in cities
vehicles (IoV)
Proposed a method that applicable to all ABE schemes
Attribute-based encryption with parallel outsourced
Feng et al. [32] with a tree access structure and can be applied to edge
decryption for edge intelligent IoV
intelligent IoV

Table 5: Distribution papers in the field of blockchain-based IoV security.

Author Title Contributions


A novel IoV block-streaming service awareness Developed a trusted verification along with IoV
Wang et al. [33]
and trusted verification scheme in 6G block-streaming service awareness
A blockchain-based byzantine consensus algorithm for
Presented the byzantine consensus algorithm according
Hu et al. [34] information authentication of the
to time sequence
Internet of vehicles
Blockchain-based asymmetric group key agreement protocol Proposed a blockchain-based asymmetric group
Zhang et al. [35]
for Internet of vehicles key agreement protocol for IoV
A privacy enhancement scheme based on blockchain Designed a vehicle privacy protection scheme in light
Wang et al. [36]
and blind signature for Internet of vehicles of blind signature and blockchain

Table 6: Distribution papers in the field of trust management-based IoV security.

Author Title Contributions


Blockchain-empowered decentralised trust management Explored suitable trust management for IoT
Cinque et al. [37]
for the Internet of vehicles security and secure blockchain
Federated learning with blockchain approach for trust Proposed federated learning for trust management
Haddaji et al. [38]
management in IoV in IoV
TrustWalker: An efficient trust assessment in vehicular
Sohail et al. [39] Presented a trust enhanced on-demand routing approach
Internet of things (VIoT) with security consideration
Towards a blockchain-based identity and trust Developed a trust management framework and a
Theodouli et al. [40]
management framework for the IoV ecosystem blockchain-based identity

security, data security, and privacy security in the IoV indus- nience, and use and improves the precision and digital intel-
try. Future research on blockchain-based IoV security technol- ligence of life technology services [41]. Bill Gates once said:
ogy should also focus on client-oriented fine-grainedness [36], “In the near future, a house without a smart home system
dynamic access control mechanisms, or cryptography-based will be like a house without Internet access today, which is
communication protocols, from blockchain-based secure data not in line with the trend.” Therefore, under the general
transmission. Conduct in-depth research on distributed key trend of IoT, the family era has come.
distribution of communication protocols, lightweight consen- However, high-level smart home security assistance is also
sus mechanism design, and blockchain-based car networking a decisive factor for the rapid development of the smart home
security architecture design. industry. Security issues in smart homes are usually not due to
external intrusions (such as hacking) leading to malfunctions
4. The Security of Smart Home or device damage (such as malicious activation of the heating
mode of the air conditioner in hot summer) [42]. From the
With the enhancement of people’s living standards, the con- application point of view, privacy leakage is the biggest secu-
cept of smart home has received more and more attention, rity risk of the smart home. Current researches mainly focus
and smart homes have gradually entered individuals’ lives. on improving privacy security from the perspectives of net-
The application of IoT in smart homes makes smart homes work, system, and data processing. Moreover, the framework
more convenient in terms of installation, operation, conve- of this section is shown in Figure 4.
Wireless Communications and Mobile Computing 7

The security of
smart home

Smart home Smart home Blockchain-based smart Future directions of


network security systems security home security smart home

Figure 4: Smart home security research architecture.

4.1. Smart Home Network Security. Cybersecurity has software or hardware vulnerabilities to achieve. To solve this
become a realistic issue in the growth of smart services. problem, the smart home domain monitoring system uses
The smart home network system consists of three parts: ter- defensive programming, which monitors and checks whether
minal controller, IoT devices, and network [41]. The user the behavior of smart devices is safe and reasonable. In addi-
sends commands to IoT devices, such as smart home appli- tion, many experts and scholars study the development of
ances, through the network by downloading the correspond- smart access control systems, smart door and window secu-
ing client via using software and the Internet to achieve rity systems, gas leak detection, personnel location, remote
automatic control, remote control, and other functions [42]. video surveillance, and database systems [46]. Such systems
As long as the home system is connected to the Internet, have the merits of low power consumption, low cost, distrib-
hackers will be able to invade the smart home system, so as uted, and self-organization of wireless sensor networks,
to ensure the security of the smart home system first need to which can effectively improve the flexibility and reliability
ensure network security, and the network entrance to the of security systems. Moreover, some of the relevant literature
smart home is the home gateway. In reality, people often is summarized as follows; please see Table 8.
pay more attention to the stability of the gateway to access
the network, ignoring the security of the gateway, and the
4.3. Blockchain-Based Smart Home Security. Security issues
only device with gateway commonly used in the home at
are a key factor hindering the growth of the smart home
present is only the router. Therefore, in the process of smart
industry. As smart home products collect a large amount
home applications, the privacy protection of family and
of privacy data of family members, many users are worried
individuals should be the primary issue [43]. Due to the fact
about the situation of network security vulnerability of the
that before the emergence of smart homes, both furniture
connected smart home devices. Blockchain technology can
and home appliances are silent and unconnected, the privacy
provide a solution to the smart home security problem,
of residential families and individuals would not have condi-
which can make device identification and identity verifica-
tions and ways to be able to be accessed by third parties [41].
tion more effective and reduce the possibility of malicious
However with network connectivity, the smart home, a new
data tampering by others. The distributed network structure
type of system that can sense, network, store, compute, and
feature of blockchain can largely ensure that even if one or
execute, does make this possibility a reality.
more nodes are breached, the data of the overall network
In the application phase of smart home, the devices first
system is still safe and secure [48–50]. Meanwhile, the inte-
have to access the cloud server by accessing the Internet and
gration of blockchain distributed technology with the under-
protocols. The most important of them are wireless IoT pro-
lying hardware makes it easier to design a secure consensus
tocols, and the main ones are currently WiFi, Bluetooth, Zig-
algorithm protocol, which makes the overall blockchain net-
bee, Z-Wave, and NB-IoT. The design flaws and security
work operation more stable.
vulnerabilities of access protocols are also an important
Applying blockchain technology in the data transmis-
source of security threats to smart devices [42–44]. More
sion of smart home devices can make the user’s data and pri-
seriously, because time-to-market is one of the key factors
vacy more secure [49] and solve the security problem of
for a vendor’s profitability, the security design and testing
smart home to some extent. Moreover, some of the relevant
of devices by vendors is often far from adequate in order
literature is summarized as follows, as shown in Table 9.
to be able to get to market as soon as possible. Moreover,
some of the relevant literature is summarized as follows;
please see Table 7. 4.4. Future Directions of Smart Home. According to the secu-
rity analysis from the perspectives of network protocols, data
4.2. Smart Home Systems Security. Smart home security information, and platform systems in the smart home indus-
requires a series of cybersecurity protocols or bills at the try, the establishment of a unified standard system is the first
legal level but also needs measures at the technical level task if the smart home industry wants to get a good and sus-
[45]. Smart homes are installed and deployed to indoor tainable development [50]. At present, the security perfor-
spaces as projects/systems, so the core remains the security mance of smart home devices is still low, and the access
of the system. It is ideal to design a smart home system with data is still easy to be stolen or even tempered with. There-
a reliable security policy and a well-defined system security fore, device access control and protection of personal privacy
and authentication process. data should also be considered in the future. Meanwhile, the
The connection of the network may expose the device capacity and processing speed of blockchain also need to be
to attackers inside or outside the network who can exploit gradually improved so as to realize the extensive application
8 Wireless Communications and Mobile Computing

Table 7: Distribution papers in the field of smart home network security.

Author Title Contributions


An overview of wireless IoT protocol security
Marksteiner et al. [41] Presented an overview of IoT application domains
in the smart home domain
Discussed smart home and security, reviewed
Robles and Kim [43] A review on security in smart home development
the tool related to smart home security
Efficient and secure device clustering for networked Proposed a member list chain and member
Kim and Lee. [44]
home domains reputation-based association scheme

Table 8: Distribution papers in the field of smart home systems security.

Author Title Contributions


Bangali and Design and implementation of security systems for Suggested two methods for home security system, i.e., web
Shaligram [42] smart home based on GSM technology camera and SMS with sensors, relays, and buzzers
Survey in smart grid and smart home security: The threats detected are categorized according to specific
Komninos et al. [45]
issues, challenges and countermeasures security goals set
The smart home security system based on Designed a smart home security system based on
Hu and Zhou [46]
wireless sensor network Zigbee wireless sensor networks
Kalofonos and Intuisec: a framework for intuitive user interaction Presented IntuiSec, a framework for intuitive user
Shakhshir [47] with smart home security using mobile devices interaction

Table 9: Distribution papers in the field of blockchain-based smart home security.

Author Title Contributions


A machine learning approach for blockchain-based Introduced a resource-efficient, blockchain-based
Khan et al. [48]
smart home networks security solution for secure and private IoT
Customized blockchain-based architecture for Explored a novel blockchain-based solution for secure
Ammi et al. [49]
secure smart home for lightweight IoT smart home systems
Described a secure smart home framework in light
Arif et al. [50] Investigating smart home security: is blockchain the answer?
of consortium blockchain

of blockchain technology in the area of smart home securi- the future. Finally, as IoT security research is the frontier
ties [51]. of research direction in the field of IoT, more researchers
are needed to conduct in-depth research in order to better
exploit the value of IoT and in turn serve society [53, 54].
5. Conclusions and Future Works
The promotion of IoT technologies needs to address plenty Data Availability
of related security issues and the large number of scenarios
of IoT applications as well as the low generalization ability The data used to support the findings of this study are
of security issues among scenarios which leads to the diffi- included within the article.
culty in the wide application of IoT technologies [50, 51].
Based on the security of IoT applications, researchers have Conflicts of Interest
actively started to explore this area and promote the rapid
development of this field. In this work, we explore the secu- The authors declare no conflicts of interest.
rity technologies for a total of three popular areas of IoT, i.e.,
IIoT, IoV, and smart home, and analyze them in the direc- Acknowledgments
tion of device security, data security, network security, and
system security. First, it is found that the application of This research was funded in part by the Shanxi Province Sci-
blockchain technology has become an effective way to entific and Technological Achievements Transformation
improve the security of IoT. Second, at the domain level, and Intellectual Property Transaction Service Platform
future research can also be done on coal, medical, and Operation Services; the Shanxi Province Digital Economy
defense industries [52]. At the technical level, machine Development Research Department; and the Information
learning, deep learning, cloud computing, and big data tech- Technology Application Innovation Provincial Technology
niques can be employed to further improve IoT security in Innovation Center.
Wireless Communications and Mobile Computing 9

References [18] M. Brown, Security: Using Static Analysis to Improve IIoT


Device Security, Panel Building and System Integration, 2017.
[1] P. Corcoran, “The Internet of Things: why now, and what’s [19] P. M. Chanal and M. S. Kakkasageri, “Security and privacy in
next?,” IEEE Consumer Electronics Magazine, vol. 5, no. 1, IoT: a survey,” Wireless Personal Communications, vol. 115,
pp. 63–68, 2016. no. 2, pp. 1667–1693, 2020.
[2] A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and [20] C. Lesjak, D. Hein, and J. Winter, “Hardware-security tech-
T. Razafindralambo, “A survey on facilities for experimental nologies for industrial IoT: TrustZone and security control-
internet of things research,” IEEE Communications Magazine, ler,” in IECON 2015-41st Annual Conference of the IEEE
vol. 49, no. 11, pp. 58–67, 2011. Industrial Electronics Society, pp. 2589–2595, Yokohama,
[3] I. Lee and K. Lee, “The Internet of Things (IoT): applications, Japan, 2015.
investments, and challenges for enterprises,” Business Hori- [21] B. A. Huberman, “Ensuring trust and security in the industrial
zons, vol. 58, no. 4, pp. 431–440, 2015. IoT: the Internet of things (Ubiquity symposium),” Ubiquity,
[4] C. M. Li, R. Wang, and L. Huang, “The key technology and vol. 2016, pp. 1–7, 2016.
application of the Internet of Things,” Applied Mechanics [22] S. Basheer, M. Gopu, R. M. Mathew, M. A. Bivi, and M. Prabu,
and Materials, vol. 644-650, pp. 2812–2815, 2014. “Industrial-IoT-hardware security-improvement using plan
[5] X. Feng, L. T. Yang, L. Wang, and A. Vinel, “Internet of load optimization method in cloud,” International Journal of
things,” International Journal of Communication Systems, Systems Assurance Engineering and Management, vol. 6,
vol. 25, no. 9, pp. 1101-1102, 2012. pp. 1–8, 2021.
[6] ITU Internet Reports 2005: The Internet of Things, vol. 1-28, [23] Y. Yu, R. Chen, H. Li, Y. Li, and A. Tian, “Toward data security
International Telecommunication Union UIT, 2005. in edge intelligent IIoT,” IEEE Network, vol. 33, no. 5, pp. 20–
[7] A. M. Rizwan, S. Wang, A. Z. Muhammad, J. A. Khan, 26, 2019.
A. Umair, and R. Salman, “Fog computing: an overview of [24] C. Lesjak, N. Druml, R. Matischek, T. Ruprechter, and
big IoT data analytics,” Wireless Communications and Mobile G. Holweg, “Security in industrial IoT – quo vadis?,” Elektro-
Computing, vol. 2018, Article ID 7157192, 22 pages, 2018. technik und Informationstechnik, vol. 133, no. 7, pp. 324–
[8] C. Zhao, X. S. Li, and J. S. Chen, “Study on the application of 329, 2016.
internet of things in the logistics in forest industry,” Applied [25] P. Rajmohan and P. S. S. Srinivasan, “Safety and security mea-
Mechanics and Materials, vol. 97-98, pp. 664–668, 2011. surement in industrial environment based on smart IoT tech-
[9] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: nology based augmented data recognizing scheme,” Computer
the internet of things architecture, possible applications and Communications, vol. 150, pp. 777–787, 2020.
key challenges,” in 2012 10th International Conference on [26] M. I. Aziz Zahed, I. Ahmad, D. Habibi, and Q. V. Phung,
Frontiers of Information Technology, pp. 257–260, Islamabad, “Content caching in industrial IoT: security and energy con-
Pakistan, 2012. siderations,” IEEE Internet of Things Journal, vol. 7, no. 1,
[10] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, pp. 491–504, 2020.
“Security, privacy and trust in Internet of Things: the road [27] A. Mosteiro-Sanchez, M. Barcelo, J. Astorga, and A. Urbieta,
ahead,” Computer Networks, vol. 76, no. 15, pp. 146–164, 2015. “Securing IIoT using defence-in-depth: towards an end-to-
[11] L. Wu, J. Xu, L. Shi, and W. Zhou, “Optimize the communica- end secure industry 4.0,” Journal of Manufacturing Systems,
tion cost of 5G internet of vehicles through coherent beam- vol. 57, pp. 367–378, 2020.
forming technology,” Wireless Communications and Mobile [28] V. Skwarek, “Blockchains as security-enabler for industrial
Computing, vol. 2012, Article ID 6668984, 12 pages, 2021. IoT-applications,” Asia Pacific Journal of Innovation and
[12] N. Matsumoto, J. Fujita, H. Endoh, T. Yamada, K. Sawada, and Entrepreneurship, vol. 11, no. 3, pp. 301–311, 2017.
O. Kaneko, “Asset management method of industrial IoT sys- [29] E. K. Wang, Z. Liang, C. M. Chen, S. Kumari, and M. K. Khan,
tems for cyber-security countermeasures,” Information, “PoRX: a reputation incentive scheme for blockchain consen-
vol. 12, no. 11, p. 460, 2021. sus of IIoT,” Future Generation Computer Systems, vol. 102,
[13] S. Schneider, The Industrial Internet of Things (IIoT): Applica- pp. 140–151, 2020.
tions and Taxonomy, John Wiley and Sons, Inc, 2016. [30] M. Shariq, K. Singh, P. K. Maurya, A. Ahmadian, and
[14] F. Wei, S. Zeadally, P. Vijayakumar, N. Kumar, and D. He, “An D. Taniar, “AnonSURP: an anonymous and secure ultralight-
intelligent terminal based privacy-preserving multi-modal weight RFID protocol for deployment in internet of vehicles
implicit authentication protocol for internet of connected systems,” The Journal of Supercomputing, vol. 78, no. 6,
vehicles,” IEEE Transactions on Intelligent Transportation Sys- pp. 8577–8602, 2022.
tems, vol. 22, no. 7, pp. 3939–3951, 2021. [31] C. T. Poomagal and G. A. S. Kumar, “ECC based lightweight
[15] S. Kriaa, L. Pietre-Cambacedes, M. Bouissou, and Y. Halgand, secure message conveyance protocol for satellite communica-
“A survey of approaches combining safety and security for tion in internet of vehicles (IoV),” Wireless Personal Commu-
industrial control systems,” Reliability Engineering & System nications, vol. 113, no. 2, pp. 1359–1377, 2020.
Safety, vol. 139, pp. 156–178, 2015. [32] C. Feng, K. Yu, M. Aloqaily, M. Alazab, Z. Lv, and S. Mumtaz,
[16] Y. Li, Q. Cheng, and W. Shi, “Security analysis of a lightweight “Attribute-based encryption with parallel outsourced decryp-
identity-based two-party authenticated key agreement proto- tion for edge intelligent IoV,” IEEE Transactions on Vehicular
col for IIoT environments,” Security and Communication Net- Technology, vol. 69, no. 11, pp. 13784–13795, 2020.
works, vol. 2021, Article ID 5573886, 6 pages, 2021. [33] Y. Wang, Y. Tian, X. Hei, L. Zhu, and W. Ji, “A novel IoV
[17] L. Ling, S. Li, and S. Zhao, “QoS-aware scheduling of services- block-streaming service awareness and trusted verification
oriented internet of things,” IEEE Transactions on Industrial scheme in 6G,” IEEE Transactions on Vehicular Technology,
Informatics, vol. 10, no. 2, pp. 1497–1505, 2014. vol. 70, no. 6, pp. 5197–5210, 2021.
10 Wireless Communications and Mobile Computing

[34] W. Hu, Y. Hu, W. Yao, and H. Li, “A blockchain-based byzan- [50] S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir, and M. Imran,
tine consensus algorithm for information authentication of the “Investigating smart home security: is blockchain the
Internet of vehicles,” IEEE Access, vol. 7, pp. 139703–139711, answer?,” IEEE Access, vol. 8, pp. 117802–117816, 2020.
2019. [51] C. Chang, S. N. Srirama, and R. Buyya, “Mobile cloud business
[35] Q. Zhang, Y. Li, R. Wang et al., “Blockchain-based asymmetric process management system for the internet of things: a sur-
group key agreement protocol for internet of vehicles,” Com- vey,” ACM Computing Surveys, vol. 49, no. 4, pp. 1–42, 2017.
puters and Electrical Engineering, vol. 86, article 106713, 2020. [52] Y. Zhao, M. Prabhu, and R. R. Ahmed, “Research trends and
[36] H. Wang, J. Gan, Y. Feng, Y. Li, and X. Fu, “A privacy performance of IIoT communication network-architectural
enhancement scheme based on blockchain and blind signature layers of petrochemical industry 4.0 for coping with circular
for Internet of vehicles,” International Conference on Block- economy,” Wireless Communications and Mobile Computing,
chain and Trustworthy Systems, vol. 1490, pp. 368–387, 2021. vol. 2021, Article ID 8822786, 32 pages, 2021.
[37] M. Cinque, C. Esposito, S. Russo, and O. Tamburis, “Block- [53] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi,
chain-empowered decentralised trust management for the “Internet of things for smart cities,” IEEE Internet of Things
Internet of Vehicles security,” Computers and Electrical Engi- Journal, vol. 1, no. 1, pp. 22–32, 2014.
neering, vol. 86, no. 12, article 106722, 2020. [54] D. Flores-Martin, J. Rojo, E. Moguel, J. Berrocal, and J. M.
[38] A. Haddaji, S. Ayed, and L. Chaari, “Federated learning with Murillo, “Smart nursing homes: self-management architecture
blockchain approach for trust management in IoV,” AINA based on IoT and machine learning for rural areas,” Wireless
2022: Advanced Information Networking and Applications, Communications and Mobile Computing, vol. 2021, Article
vol. 449, pp. 411–423, 2022. ID 8874988, 15 pages, 2021.
[39] M. Sohail, R. Ali, M. Kashif et al., “TrustWalker: an efficient
trust assessment in vehicular Internet of things (VIoT) with
security consideration,” Sensors, vol. 20, no. 14, p. 3945, 2020.
[40] A. Theodouli, K. Moschou, K. Votis, D. Tzovaras, J. Lauinger,
and S. Steinhorst, “Towards a blockchain-based identity and
trust management framework for the IoV ecosystem,” in
2020 Global Internet of Things Summit (GIoTS), pp. 1–6, Dub-
lin, Ireland, 2020.
[41] S. Marksteiner, V. J. Exposito Jimenez, H. Valiant, and
H. Zeiner, “An overview of wireless IoT protocol security in
the smart home domain,” in 2017 Internet of Things Business
Models, Users, and Networks, Copenhagen, Denmark, 2017.
[42] J. Bangali and A. Shaligram, “Design and implementation of
security systems for smart home based on GSM technology,”
International Journal of Smart Home, vol. 7, no. 6, pp. 201–
208, 2013.
[43] R. J. Robles and T. H. Kim, “A review on security in smart
home development,” International Journal of Advanced Sci-
ence and Technology, vol. 15, pp. 13–22, 2010.
[44] D. Kim and J. Lee, “Efficient and secure device clustering for
networked home domains,” IEEE Transactions on Consumer
Electronics, vol. 65, no. 2, pp. 224–232, 2019.
[45] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart
grid and smart home security: issues, challenges and counter-
measures,” IEEE Communications Surveys and Tutorials,
vol. 16, no. 4, pp. 1933–1954, 2014.
[46] Y. Hu and T. Zhou, “The smart home security system based on
wireless sensor network,” Advanced Materials Research,
vol. 204-210, pp. 1490–1493, 2011.
[47] D. N. Kalofonos and S. Shakhshir, “Intuisec: a framework for
intuitive user interaction with smart home security using
mobile devices,” Massachusetts Institute of Technology,
vol. 555, no. 4, pp. 659–708, 2008.
[48] M. A. Khan, S. Abbas, A. Rehman et al., “A machine learning
approach for blockchain-based smart home networks secu-
rity,” IEEE Network, vol. 35, no. 3, pp. 223–229, 2021.
[49] M. Ammi, S. Alarabi, and E. Benkhelifa, “Customized
blockchain-based architecture for secure smart home for light-
weight IoT,” Information Processing and Management, vol. 58,
no. 3, article 102482, 2021.

You might also like