A comprehensive study of security of internet-of-things

Arsalan Mosenia, Niraj K. Jha

Research output: Contribution to journalArticlepeer-review

465 Scopus citations


Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a transformative approach for providing numerous services. Compact smart devices constitute an essential part of IoT. They range widely in use, size, energy capacity, and computation power. However, the integration of these smart things into the standard Internet introduces several security challenges because the majority of Internet technologies and communication protocols were not designed to support IoT. Moreover, commercialization of IoT has led to public security concerns, including personal privacy issues, threat of cyber attacks, and organized crime. In order to provide a guideline for those who want to investigate IoT security and contribute to its improvement, this survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing. To achieve this goal, we first briefly describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new paradigm. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.

Original languageEnglish (US)
Article number7562568
Pages (from-to)586-602
Number of pages17
JournalIEEE Transactions on Emerging Topics in Computing
Issue number4
StatePublished - Oct 1 2017

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications


  • Availability
  • Confidentiality
  • Countermeasures
  • Integrity
  • Internet of Things
  • Privacy
  • Security
  • Vulnerabilities


Dive into the research topics of 'A comprehensive study of security of internet-of-things'. Together they form a unique fingerprint.

Cite this