TY - JOUR
T1 - Holistic Survey on Security in IoT Application Layer
T2 - Attacks, Protocols, and Applications
AU - Sharmila Kumari, N.
AU - Vimala, H. S.
AU - Pruthvi, C. N.
AU - Shreyas, J.
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2024
Y1 - 2024
N2 - Context: The growing number of linked devices, the limitations of some IoT devices, worries about data privacy, risks to physical safety, and the ever-changing threats all highlight why it's crucial to have strong security measures in the IoT application layer. We need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks. Objective: The study's goal is to examine the research on IoT application layer security with attacks, applications and protocols and demands further focus in current and future research areas. Method: To find the relevant literature, a systematic investigation was done, in 221 articles, 123 articles are selected as a most relevant articles and classified as security in IoT applications and protocols. Result: This paper mainly concentrated on security in IoT application layer, the articles are grouped as attacks, applications and protocols. Based on IoT applications, smart home (15.3%), smart health care (12.2%), smart home (13.3%), smart agriculture (17.3%), smart vehicles (16.3%), smart grid(15.3%) and Industrial IoT (10.2%) represents the majority of articles. This survey further analyses the performance metrics, parameters and performance evaluation of the existing literature. Conclusion: The results confirm that we need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks.
AB - Context: The growing number of linked devices, the limitations of some IoT devices, worries about data privacy, risks to physical safety, and the ever-changing threats all highlight why it's crucial to have strong security measures in the IoT application layer. We need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks. Objective: The study's goal is to examine the research on IoT application layer security with attacks, applications and protocols and demands further focus in current and future research areas. Method: To find the relevant literature, a systematic investigation was done, in 221 articles, 123 articles are selected as a most relevant articles and classified as security in IoT applications and protocols. Result: This paper mainly concentrated on security in IoT application layer, the articles are grouped as attacks, applications and protocols. Based on IoT applications, smart home (15.3%), smart health care (12.2%), smart home (13.3%), smart agriculture (17.3%), smart vehicles (16.3%), smart grid(15.3%) and Industrial IoT (10.2%) represents the majority of articles. This survey further analyses the performance metrics, parameters and performance evaluation of the existing literature. Conclusion: The results confirm that we need these measures to protect our devices and data, keep our personal information safe, and prevent potential harm or attacks. It's important to make sure our IoT applications have effective security to counter these risks.
UR - https://www.scopus.com/pages/publications/85204559235
UR - https://www.scopus.com/inward/citedby.url?scp=85204559235&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2024.3462170
DO - 10.1109/ACCESS.2024.3462170
M3 - Article
AN - SCOPUS:85204559235
SN - 2169-3536
VL - 12
SP - 186957
EP - 187014
JO - IEEE Access
JF - IEEE Access
ER -