{"title":"物联网安全综合调查:挑战、安全问题和对策","authors":"Ankit Sharma, Kriti Bhushan","doi":"10.1016/j.cosrev.2025.100839","DOIUrl":null,"url":null,"abstract":"<div><div>IoT is an emerging technology in which physical objects are embedded with computing and networking capabilities, commonly referred to as intelligent devices. IoT technology is rapidly growing due to its unique features, such as minimal human intervention, cost-effectiveness, and ease of deployment. However, this widespread adoption also introduces challenges related to scalability and security. Since the IoT ecosystem is characterized by diverse technologies and resource-constrained devices, IoT applications become more vulnerable, providing attackers with a strategic advantage. Consequently, security is a paramount concern in IoT systems. The primary objective of this paper is to investigate security concerns in the IoT environment. This study examines security challenges from multiple perspectives, including architecture-level concerns, component-level vulnerabilities, application-level threats, and emerging risks. This paper discusses general IoT attacks, categorized according to different layers, and subsequently presents RFID as a use case to illustrate these concepts more clearly. Additionally, the current literature addresses emerging attack vectors and their associated countermeasures, offering a thorough overview of evolving security challenges and defense strategies. Many existing research papers do not comprehensively address security issues across the entire IoT ecosystem, including emerging attacks and their countermeasures. This paper covers the major attack vectors in IoT, explores state-of-the-art techniques such as blockchain and their role in enhancing IoT security, and examines newly emerged threats such as adversarial attacks, filling a critical gap.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"59 ","pages":"Article 100839"},"PeriodicalIF":12.7000,"publicationDate":"2025-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive survey on IoT security: Challenges, security issues, and countermeasures\",\"authors\":\"Ankit Sharma, Kriti Bhushan\",\"doi\":\"10.1016/j.cosrev.2025.100839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>IoT is an emerging technology in which physical objects are embedded with computing and networking capabilities, commonly referred to as intelligent devices. IoT technology is rapidly growing due to its unique features, such as minimal human intervention, cost-effectiveness, and ease of deployment. However, this widespread adoption also introduces challenges related to scalability and security. Since the IoT ecosystem is characterized by diverse technologies and resource-constrained devices, IoT applications become more vulnerable, providing attackers with a strategic advantage. Consequently, security is a paramount concern in IoT systems. The primary objective of this paper is to investigate security concerns in the IoT environment. This study examines security challenges from multiple perspectives, including architecture-level concerns, component-level vulnerabilities, application-level threats, and emerging risks. This paper discusses general IoT attacks, categorized according to different layers, and subsequently presents RFID as a use case to illustrate these concepts more clearly. Additionally, the current literature addresses emerging attack vectors and their associated countermeasures, offering a thorough overview of evolving security challenges and defense strategies. Many existing research papers do not comprehensively address security issues across the entire IoT ecosystem, including emerging attacks and their countermeasures. This paper covers the major attack vectors in IoT, explores state-of-the-art techniques such as blockchain and their role in enhancing IoT security, and examines newly emerged threats such as adversarial attacks, filling a critical gap.</div></div>\",\"PeriodicalId\":48633,\"journal\":{\"name\":\"Computer Science Review\",\"volume\":\"59 \",\"pages\":\"Article 100839\"},\"PeriodicalIF\":12.7000,\"publicationDate\":\"2025-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science Review\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1574013725001157\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725001157","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A comprehensive survey on IoT security: Challenges, security issues, and countermeasures
IoT is an emerging technology in which physical objects are embedded with computing and networking capabilities, commonly referred to as intelligent devices. IoT technology is rapidly growing due to its unique features, such as minimal human intervention, cost-effectiveness, and ease of deployment. However, this widespread adoption also introduces challenges related to scalability and security. Since the IoT ecosystem is characterized by diverse technologies and resource-constrained devices, IoT applications become more vulnerable, providing attackers with a strategic advantage. Consequently, security is a paramount concern in IoT systems. The primary objective of this paper is to investigate security concerns in the IoT environment. This study examines security challenges from multiple perspectives, including architecture-level concerns, component-level vulnerabilities, application-level threats, and emerging risks. This paper discusses general IoT attacks, categorized according to different layers, and subsequently presents RFID as a use case to illustrate these concepts more clearly. Additionally, the current literature addresses emerging attack vectors and their associated countermeasures, offering a thorough overview of evolving security challenges and defense strategies. Many existing research papers do not comprehensively address security issues across the entire IoT ecosystem, including emerging attacks and their countermeasures. This paper covers the major attack vectors in IoT, explores state-of-the-art techniques such as blockchain and their role in enhancing IoT security, and examines newly emerged threats such as adversarial attacks, filling a critical gap.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.