Journals

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.

Also see ResearchGate, Academia.edu and Google scholar.

Journals
[J.1] P. I. R. Grammatikis, P. G. Sarigiannidis, and I. D. Moscholios,“Securing the internet of things: Challenges, threats and solutions,”Internet of Things, vol. 5, pp. 41 – 70, 2019. [Online]. Available:http://www.sciencedirect.com/science/article/pii/S2542660518301161.    [BibTeX]

@article{RADOGLOUGRAMMATIKIS201941,
title = "Securing the Internet of Things: Challenges, threats and solutions",
journal = "Internet of Things",
volume = "5",
pages = "41 - 70",
year = "2019",
issn = "2542-6605",
doi = "https://doi.org/10.1016/j.iot.2018.11.003",
url = "http://www.sciencedirect.com/science/article/pii/S2542660518301161",
author = "Panagiotis I. Radoglou Grammatikis and Panagiotis G. Sarigiannidis and Ioannis D. Moscholios",
keywords = "Countermeasures, Cyberattacks, Internet of Things, Privacy, Protocols, Risk assessment, Security",
abstract = "The Internet of Things (IoT) is the next technological leap that will introduce significant improvements to various aspects of the human environment, such as health, commerce, and transport. However, despite the fact that it may bring beneficial economic and social changes, the security and the privacy protection of objects and users remain a crucial challenge that has to be addressed. Specifically, now the security measures have to monitor and control the actions both of users and objects. However, the interconnected and independent nature of objects, as well as their constrained capabilities regarding the computing resources make impossible the applicability of the conventional security mechanisms. Moreover, the heterogeneity of various technologies which the IoT combines increases the complexity of the security processes, since each technology is characterized by different vulnerabilities. Furthermore, the tremendous amounts of data which is generated by the multiple interactions between the users and objects or among the objects make harder their management and the functionality of the access control systems. In this context, this paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures. More detailed, after studying and determining the security requirements in the context of the IoT, we implement a qualitative and quantitative risk analysis, investigating the security threats per layer. Subsequently, based on this process we identify the suitable countermeasures and their limitations, paying special attention to the IoT protocols. Finally, we provide research directions for future work."
}