Internet of Things Security and Privacy: A Systematic Investigation


  • S. Shiva Prakash, M. P.Vani


IoT Security, IoT Protocols, Neural Networks, IOT Energy Management.


The Internet of Things (IoT) paradigm shift is one of the most remarkable phenomena of recent times.Many security issues are triggered when disparate IoT devices are combined with the traditional Internet. This is because conventional internet connection methods were never intended to accommodate IoT. As a result, there are now countless ways in which IoT-enabled equipment could be compromised.  This assessment of the literature centred on the primary concerns regarding the safety of IoT. The adaption of machine learning techniques in IoT, as well as its layered architecture, protocols for communication, and energy-efficient data routing strategies, were all subjects of our research. In addition to discussing the current attacks, hazards, and state-of-the-art remedies, we lay out a road map for meeting the security needs of the Internet of Things. We also compile a table of IoT security issues and a map of published remedies.  We conclude that an attacker can compromise an IoT device, infrastructure, or network based on the results of this study. As a result of the information gathered in this poll, researchers are more motivated than ever to create a foolproof intrusion detection system for the Internet of Things (IoT).


Download data is not yet available.


A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. J. I. c. s. Ayyash, and tutorials, "Internet of things: A survey on enabling technologies, protocols, and applications," vol. 17, no. 4, pp. 2347-2376, 2015.

J. Deogirikar and A. Vidhate, "Security attacks in IoT: A survey," in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017, pp. 32-37: IEEE.

Y. Yang, L. Wu, G. Yin, L. Li, and H. J. I. I. o. T. J. Zhao, "A survey on security and privacy issues in Internet-of-Things," vol. 4, no. 5, pp. 1250-1258, 2017.

M. Amadeo, C. Campolo, A. Iera, and A. Molinaro, "Information Centric Networking in IoT scenarios: The case of a smart home," in 2015 IEEE international conference on communications (ICC), 2015, pp. 648-653: IEEE.

M. Mohsin, Z. Anwar, G. Husari, E. Al-Shaer, and M. A. Rahman, "IoTSAT: A formal framework for security analysis of the internet of things (IoT)," in 2016 IEEE Conference on Communications and Network Security (CNS), 2016, pp. 180-188: IEEE.

S. R. Moosavi et al., "SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways," vol. 52, pp. 452-459, 2015.

F. Olivier, G. Carlos, and N. J. P. C. S. Florent, "New security architecture for IoT network," vol. 52, pp. 1028-1033, 2015.

M. Miettinen et al., "IoT Sentinel Demo: Automated device-type identification for security enforcement in IoT," in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, pp. 2511-2514: IEEE.

S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. J. I. s. j. Ferrari, "Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios," vol. 15, no. 2, pp. 1224-1234, 2015.

R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future internet: the internet of things architecture, possible applications and key challenges," in 2012 10th international conference on frontiers of information technology, 2012, pp. 257-260: IEEE.

M. Pavani, P. T. J. I. J. o. C. N. Rao, and I. Security, "Urban air pollution monitoring using wireless sensor networks: a comprehensive review," vol. 9, no. 3, pp. 439-449, 2017.

G. Mois, S. Folea, T. J. I. T. o. I. Sanislav, and Measurement, "Analysis of three IoT-based wireless sensors for environmental monitoring," vol. 66, no. 8, pp. 2056-2064, 2017.

G. Marques, R. J. I. j. o. e. r. Pitarma, and p. health, "An indoor monitoring system for ambient assisted living based on internet of things architecture," vol. 13, no. 11, p. 1152, 2016.

J. Granjal, E. Monteiro, J. S. J. I. C. S. Silva, and Tutorials, "Security for the internet of things: a survey of existing protocols and open research issues," vol. 17, no. 3, pp. 1294-1312, 2015.

M. Ambrosin et al., "On the feasibility of attribute-based encryption on internet of things devices," vol. 36, no. 6, pp. 25-35, 2016.

M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. J. a. p. a. Shah, "SIT: a lightweight encryption algorithm for secure internet of things," 2017.

A. A. Gendreau and M. Moorman, "Survey of intrusion detection systems towards an end to end secure internet of things," in 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), 2016, pp. 84-90: IEEE.

N. Vipin and M. A. Nizar, "Efficient on-line SPAM filtering for encrypted messages," in 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015, pp. 1-5: IEEE.

E. Hodo et al., "Threat analysis of IoT networks using artificial neural network intrusion detection system," in 2016 International Symposium on Networks, Computers and Communications (ISNCC), 2016, pp. 1-6: IEEE.

M. Nobakht, V. Sivaraman, and R. Boreli, "A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow," in 2016 11th International conference on availability, reliability and security (ARES), 2016, pp. 147-156: IEEE.




How to Cite

M. P.Vani, S. S. P. . (2024). Internet of Things Security and Privacy: A Systematic Investigation. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1316–1324. Retrieved from



Research Article