Challenges and issues for Internet of Things (IoT): recent survey

dc.citation.epage806
dc.citation.issue3
dc.citation.journalTitleМатематичне моделювання та комп'ютинг
dc.citation.spage796
dc.contributor.affiliationУніверситет Хасана ІІ Касабланки
dc.contributor.affiliationHassan II University of Casablanca
dc.contributor.authorГуеро, А.-М. М.
dc.contributor.authorЧіба, З.
dc.contributor.authorАбгхур, Н.
dc.contributor.authorGuéro, A.-M. M.
dc.contributor.authorChiba, Z.
dc.contributor.authorAbghour, N.
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-03-04T12:17:26Z
dc.date.created2023-02-28
dc.date.issued2023-02-28
dc.description.abstractІнтернет речей (IoT) є однією з найбільш нових і революційних технологій цього століття. IoT — це мережа спеціалізованих пристроїв, які називаються “речі”, що розгортаються та використовуються для збору, обробки та обміну реальними даними через Інтернет або інші мережі. У поєднанні з системами автоматизації пристрої IoT можуть допомогти керувати, контролювати та сповіщати користувачів про зміни в їхньому середовищі, допомагати їм приймати розумніші рішення, полегшувати повсякденне життя та сприяти розвитку економіки та промисловості. Тим не менш, експоненційне зростання обладнання IoT, а також відсутність загальних міжнародних стандартів призводять до величезних проблем, серед яких безпека та продуктивність. Дійсно, зі збільшенням кількості пристроїв старі методи керування підключеними пристроями стають невідповідними, це створює порушення безпеки. Крім того, обмежені ресурси пристроїв Інтернету речей, крім природи їхньої мережі, перешкоджають застосуванню потужних і складних заходів безпеки до них. Як наслідок, пристрої IoT є вразливими та схильними до багатьох загроз безпеці та вторгнень. У цій статті представлено огляд проблем і викликів IoT. Крім того, подано глибокий аналіз рішень, що запропоновані у літературі для вирішення цих проблем. Це допомагає означити проблеми, які все ще потребують вирішення, добре окреслює основний напрямок досліджень і розчищає шлях для нових напрямків досліджень для майбутніх дослідників. Нарешті, надаємо посібник або підтримку для науковців, які цікавляться Інтернетом речей.
dc.description.abstractThe Internet of Things (IoT) is one of the most emerging and revolutionary technologies of this century. The IoT is a network of dedicated devices called things deployed and used to collect, handle and exchange real-world data over the Internet or other networks. Combined with automation systems, IoT devices can help manage, monitor, and alert users to the changes in their environment, assist them to make smarter decisions, facilitate daily life, and contribute to the development of the economy and industry. Nevertheless, the exponential growth of IoT equipment as well as the absence of common international standards leads to huge challenges, among which are security and performance. Indeed, with an increasing number of devices, the old methods of managing connected devices become inappropriate, which creates security breaches. Furthermore, the limited resources of IoT devices besides the nature of their network prevent the implementation of strong and sophisticated security measures on them. As a result, IoT appliances are vulnerable and prone to many security threats and intrusions. This paper presents an overview of IoT issues and challenges. Also, it exhibits a deep analysis of the solutions proposed in the literature for these issues. This assists to mark the concerns that still require to be handled, well outlines the mainstream of research direction, and clears the way for new avenues of research for forthcoming researchers. Finally, we deliver a guide or support for scientists interested in the Internet of Things.
dc.format.extent796-806
dc.format.pages11
dc.identifier.citationGuéro A.-M. M. Challenges and issues for Internet of Things (IoT): recent survey / A.-M. M. Guéro, Z. Chiba, N. Abghour // Mathematical Modeling and Computing. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 10. — No 3. — P. 796–806.
dc.identifier.citationenGuéro A.-M. M. Challenges and issues for Internet of Things (IoT): recent survey / A.-M. M. Guéro, Z. Chiba, N. Abghour // Mathematical Modeling and Computing. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 10. — No 3. — P. 796–806.
dc.identifier.doidoi.org/10.23939/mmc2023.03.796
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/63515
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofМатематичне моделювання та комп'ютинг, 3 (10), 2023
dc.relation.ispartofMathematical Modeling and Computing, 3 (10), 2023
dc.relation.references[1] Aqeel ur Rehman, Sadiq ur Rehman, Khan I. U., Moiz M., Hasan S. Security and privacy issues in IoT. International Journal of Communication Networks and Information Security. 8 (3), 147–157 (2016).
dc.relation.references[2] Albishi S., Soh B., Ullah A., Algarni F. Challenges and solutions for applications and technologies in the internet of things. Procedia Computer Science. 124, 608–614 (2017).
dc.relation.references[3] Transforma Insights. Number of internet of things (iot) connected devices worldwide from 2019 to 2030, by vertical. Statista (2022).
dc.relation.references[4] Merzouk S., Gandoul R., Marzak A., Sael N. Toward new data for IT and IoT projectmanagement method prediction. Mathematical Modeling and Computing. 10 (2), 557–565 (2023).
dc.relation.references[5] Yadav G., Singh D. Internet of Things: A Comprehensive Survey. Wireless Personal Communications. 120 (4), 4341–4383 (2021).
dc.relation.references[6] Al-Fuqaha M. A., Guizani M., Mohammadi M., Aledhari M., Ayyash M. A Comprehensive Survey on Internet of Things (IoT): Concepts, Security, and Applications. IEEE Communications Surveys & Tutorials. 23 (3), 1846–1870 (2021).
dc.relation.references[7] Purohit S. S., Palkar P. M. A Comprehensive Survey on Security and Privacy of IoT Networks. Journal of Network and Computer Applications. 189, 103054 (2022).
dc.relation.references[8] Chiba Z., Abghour N., Moussaid K., Lifandali O., Kinta R. A Deep Study of Novel Intrusion Detection Systems and Intrusion Prevention Systems for Internet of Things Networks. Procedia Computer Science. 210, 94–103 (2022).
dc.relation.references[9] Chiba Z., Abghour N., Moussaid K., Lifandali O., Kinta R. Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT Networks. 2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). 1–6 (2022).
dc.relation.references[10] Gazis V., Goertz M., Huber M., Leonardi A., Mathioudakis K., Wiesmaier A., Zeiger F. Vangelis Gazis Manuel Goertz Marco Huber Alessandro Leonardi. IoT: Challenges, projects, architectures. 2015 18th International Conference on Intelligence in Next Generation Networks. 145–147 (2015).
dc.relation.references[11] Bataineh M. R., Mardini W., Khamayseh Y. M., Yassein M. M. B. Novel and Secure Blockchain Framework for Health Applications in IoT. IEEE Access. 10, 14914–14926 (2022).
dc.relation.references[12] Zhang H., Feng H., Hewage K., Arashpour M. Artificial Neural Network for Predicting Building Energy Performance: A Surrogate Energy Retrofits Decision Support Framework. Buildings. 12 (6), 829 (2022).
dc.relation.references[13] Arumugam S., Subramanian A., Karuppiah M., Al-Jumaily A. M., Ramakrishnan S. A Secure and PrivacyPreserving Internet of Things Framework for Healthcare Applications. IEEE Access. 9, 121527–121537 (2021).
dc.relation.references[14] Chithaluru P., Stephan T., Kumar M., Nayyar A. An enhanced energy-efficient fuzzy-based cognitive radio scheme for IoT. Neural Computing and Applications. 34 (21), 19193–19215 (2022).
dc.relation.references[15] Ahmed A., Abdullah S., Bukhsh M., Ahmad I., Mushtaq Z. An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain. IEEE Access. 10, 11404–11419 (2022).
dc.relation.references[16] Zhang X., Manogaran G., Muthu B. IoT enabled integrated system for green energy into smart cities. Sustainable Energy Technologies and Assessments. 46, 101208 (2021).
dc.relation.references[17] Tipantu˜na C., Hesselbach X. IoT-Enabled Proposal for Adaptive Self-Powered Renewable Energy Management in Home Systems. IEEE Access. 9, 64808–64827 (2021).
dc.relation.references[18] Shekari T., Cardenas A. A., Beyah R. MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses. 31st USENIX Security Symposium (USENIX Security 22). 3539–3556 (2022).
dc.relation.references[19] Alsmirat M. A., Alenezi M. Efficient Security Mechanism for Internet of Things Networks using Blockchain Technology. International Journal of Advanced Computer Science and Applications. 12 (5), 182–189 (2021).
dc.relation.references[20] De Souza C. A., Westphall C. B., Machado R. B. Two-step ensemble approach for intrusion detection and identification in iot and fog computing environments. Computers & Electrical Engineering. 98, 107694 (2022).
dc.relation.references[21] Basati A., Faghih M. M. PPDAE: Efficient network intrusion detection in IoT using parallel deep autoencoders. Information Sciences. 598, 57–74 (2022).
dc.relation.references[22] Alkhateeb A. M., Alsahafi A. H., Alshamrani A. M., Almohammadi H. A. Real-time performance optimization of IoT-based systems using machine learning techniques. Sustainable Computing: Informatics and Systems. 32, 100588 (2023).
dc.relation.references[23] Khalid M. H., Ahmad I., Javaid N., Imran M. A., Alrajeh N. Performance Evaluation of LoRaWAN in IoTbased Industrial Automation. IEEE Access. 10, 16138–16149 (2022).
dc.relation.references[24] Hannah S., Deepa A. J., Chooralil V. S., Brilly Sangeetha S., Yuvaraj N., Raja R. A., Suresh C., Vignesh R., Yasir Abdullah R., Srihari K., Alene A. Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data. BioMed Research International. 2022, 5038851 (2022).
dc.relation.references[25] Tace Y., Elfilali S., Tabaa M., Leghris C. Implementation of smart irrigation using IoT and Artificial Intelligence. Mathematical Modeling and Computing. 10 (2), 575–582 (2023).
dc.relation.referencesen[1] Aqeel ur Rehman, Sadiq ur Rehman, Khan I. U., Moiz M., Hasan S. Security and privacy issues in IoT. International Journal of Communication Networks and Information Security. 8 (3), 147–157 (2016).
dc.relation.referencesen[2] Albishi S., Soh B., Ullah A., Algarni F. Challenges and solutions for applications and technologies in the internet of things. Procedia Computer Science. 124, 608–614 (2017).
dc.relation.referencesen[3] Transforma Insights. Number of internet of things (iot) connected devices worldwide from 2019 to 2030, by vertical. Statista (2022).
dc.relation.referencesen[4] Merzouk S., Gandoul R., Marzak A., Sael N. Toward new data for IT and IoT projectmanagement method prediction. Mathematical Modeling and Computing. 10 (2), 557–565 (2023).
dc.relation.referencesen[5] Yadav G., Singh D. Internet of Things: A Comprehensive Survey. Wireless Personal Communications. 120 (4), 4341–4383 (2021).
dc.relation.referencesen[6] Al-Fuqaha M. A., Guizani M., Mohammadi M., Aledhari M., Ayyash M. A Comprehensive Survey on Internet of Things (IoT): Concepts, Security, and Applications. IEEE Communications Surveys & Tutorials. 23 (3), 1846–1870 (2021).
dc.relation.referencesen[7] Purohit S. S., Palkar P. M. A Comprehensive Survey on Security and Privacy of IoT Networks. Journal of Network and Computer Applications. 189, 103054 (2022).
dc.relation.referencesen[8] Chiba Z., Abghour N., Moussaid K., Lifandali O., Kinta R. A Deep Study of Novel Intrusion Detection Systems and Intrusion Prevention Systems for Internet of Things Networks. Procedia Computer Science. 210, 94–103 (2022).
dc.relation.referencesen[9] Chiba Z., Abghour N., Moussaid K., Lifandali O., Kinta R. Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT Networks. 2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). 1–6 (2022).
dc.relation.referencesen[10] Gazis V., Goertz M., Huber M., Leonardi A., Mathioudakis K., Wiesmaier A., Zeiger F. Vangelis Gazis Manuel Goertz Marco Huber Alessandro Leonardi. IoT: Challenges, projects, architectures. 2015 18th International Conference on Intelligence in Next Generation Networks. 145–147 (2015).
dc.relation.referencesen[11] Bataineh M. R., Mardini W., Khamayseh Y. M., Yassein M. M. B. Novel and Secure Blockchain Framework for Health Applications in IoT. IEEE Access. 10, 14914–14926 (2022).
dc.relation.referencesen[12] Zhang H., Feng H., Hewage K., Arashpour M. Artificial Neural Network for Predicting Building Energy Performance: A Surrogate Energy Retrofits Decision Support Framework. Buildings. 12 (6), 829 (2022).
dc.relation.referencesen[13] Arumugam S., Subramanian A., Karuppiah M., Al-Jumaily A. M., Ramakrishnan S. A Secure and PrivacyPreserving Internet of Things Framework for Healthcare Applications. IEEE Access. 9, 121527–121537 (2021).
dc.relation.referencesen[14] Chithaluru P., Stephan T., Kumar M., Nayyar A. An enhanced energy-efficient fuzzy-based cognitive radio scheme for IoT. Neural Computing and Applications. 34 (21), 19193–19215 (2022).
dc.relation.referencesen[15] Ahmed A., Abdullah S., Bukhsh M., Ahmad I., Mushtaq Z. An Energy-Efficient Data Aggregation Mechanism for IoT Secured by Blockchain. IEEE Access. 10, 11404–11419 (2022).
dc.relation.referencesen[16] Zhang X., Manogaran G., Muthu B. IoT enabled integrated system for green energy into smart cities. Sustainable Energy Technologies and Assessments. 46, 101208 (2021).
dc.relation.referencesen[17] Tipantu˜na C., Hesselbach X. IoT-Enabled Proposal for Adaptive Self-Powered Renewable Energy Management in Home Systems. IEEE Access. 9, 64808–64827 (2021).
dc.relation.referencesen[18] Shekari T., Cardenas A. A., Beyah R. MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses. 31st USENIX Security Symposium (USENIX Security 22). 3539–3556 (2022).
dc.relation.referencesen[19] Alsmirat M. A., Alenezi M. Efficient Security Mechanism for Internet of Things Networks using Blockchain Technology. International Journal of Advanced Computer Science and Applications. 12 (5), 182–189 (2021).
dc.relation.referencesen[20] De Souza C. A., Westphall C. B., Machado R. B. Two-step ensemble approach for intrusion detection and identification in iot and fog computing environments. Computers & Electrical Engineering. 98, 107694 (2022).
dc.relation.referencesen[21] Basati A., Faghih M. M. PPDAE: Efficient network intrusion detection in IoT using parallel deep autoencoders. Information Sciences. 598, 57–74 (2022).
dc.relation.referencesen[22] Alkhateeb A. M., Alsahafi A. H., Alshamrani A. M., Almohammadi H. A. Real-time performance optimization of IoT-based systems using machine learning techniques. Sustainable Computing: Informatics and Systems. 32, 100588 (2023).
dc.relation.referencesen[23] Khalid M. H., Ahmad I., Javaid N., Imran M. A., Alrajeh N. Performance Evaluation of LoRaWAN in IoTbased Industrial Automation. IEEE Access. 10, 16138–16149 (2022).
dc.relation.referencesen[24] Hannah S., Deepa A. J., Chooralil V. S., Brilly Sangeetha S., Yuvaraj N., Raja R. A., Suresh C., Vignesh R., Yasir Abdullah R., Srihari K., Alene A. Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data. BioMed Research International. 2022, 5038851 (2022).
dc.relation.referencesen[25] Tace Y., Elfilali S., Tabaa M., Leghris C. Implementation of smart irrigation using IoT and Artificial Intelligence. Mathematical Modeling and Computing. 10 (2), 575–582 (2023).
dc.rights.holder© Національний університет “Львівська політехніка”, 2023
dc.subjectІнтернет речей
dc.subjectвиклики
dc.subjectпитання
dc.subjectпродуктивність IoT
dc.subjectбезпека IoT
dc.subjectInternet of Things
dc.subjectchallenges
dc.subjectissues
dc.subjectIoT performance
dc.subjectIoT security
dc.titleChallenges and issues for Internet of Things (IoT): recent survey
dc.title.alternativeНедавнє дослідження викликів і проблем для Інтернету речей (IoT)
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2023v10n3_Guero_A-M_M-Challenges_and_issues_796-806.pdf
Size:
987.3 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2023v10n3_Guero_A-M_M-Challenges_and_issues_796-806__COVER.png
Size:
458.21 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.82 KB
Format:
Plain Text
Description: