In real time, Trillions of physical devices are interconnected to the internet to gather and share data all around the world. The Internet of Things (IoT) is a modern technology that has the potential to improve human life and experiences. If a device can communicate with another device, there’s always potential that it can be hacked and provide a way in to the network the device is connected to. There is no proper security standard. In the first part, we will see the overview of the security standards. In the next part, Literature surveys on the most recent security standards are discussed. The most important security standards and its techniques are given. Finally, summarized all the research results discussed previously.

1.
Yuchen
Yang
,
Longfei
Wu
,
Guisheng
Yin
,
Lijie
Li
, and
Hongbin
Zhao
,
IEEE INTERNET OF THINGS JOURNAL
(
2016
).
2.
Rachit
,
ShobhaBhatt
,
Prakash
RaoRagiri1
Security trends in Internet of Things: asurvey
‖,
SNApplied Sciences
(
2021
)
3
:
121
3.
||
Hanan
Aldowah
,
Shafiq
UlRehman
, and
Irfan
Umar
,
―Security in Internet of Things: aIssues, Challengesand Solutions‖
,
Springer Nature Switzerland AG
2019
, pp.
396
405
, 2019.
4.
Sweta
Singh
and
Rakesh
Kumar
,
―Internet of Things: Challenges, Security Issues and Solutions‖
,
Springer Nature Singapore Pte Ltd
.
2021
,
5.
J.
Cynthia
,
H. Parveen
Sultana
,
M. N.
Saroja
and
J.
Senthil
―Security Protocols for IoT‖
,
Springer Nature Switzerland AG
2019
6.
R.
Yugha
,
S.
Chithra
A survey on technologies and security protocols: Reference for future generation IoT
‖,
Journal of Network and Computer Applications
(
2020
),
7.
Narasimha
Swamy
S,
Kota
Solomon
, doi: ,
IEEEAccess.
8.
B. J.
Mohd
and
T.
Hayajneh
, ―
Lightweight block ciphers for IoT: Energy optimization and survivability techniques,
IEEE Access
, vol.
6
, pp.
35966
35978
,
2018
.
9.
Jason M.
McGinthy
and
Alan J.
Michaels
,
2018 IEEE Confs on Internet of Things, Green Computingand Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congresson Cybermatics
DOI .
10.
J.
Deogirikar
and
A.
Vidhate
, ―
Security attacks in IoT: A survey
‖ in
Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
, February
2017
.
11.
K.
Daimi
, ―
Computer and network security essentials,
Comput. Netw. Secur. Essentials
, pp.
1
618
,
2017
.
12.
Y. M.
Armknecht
F,
Moriyama
D
,
Sadeghi
A.R
in
CT-RSA 2016: Topics in Cryptology - CT-RSA 2016
,
2016
, vol.
9610
, pp.
271
287
.
13.
R. A. Priyanka
Mall
,
Md Zakirul Alam
Bhuiyan
, in
Security, Privacy, and Anonymity in Computation, Communication and Storage
.
SpaCCS 2019, Lecture Notes in Computer Science
,
2018
, vol.
11611
, pp.
26
35
.
14.
Z. A.
Khan
and
P.
Herrmann
, ―
Recent advancements in intrusion detection systems for the internet of things,
Secur. Commun. Networks
, vol.
2019
,
2019
.
15.
M. F.
Elrawy
,
A. I.
Awad
, and
H. F. A.
Hamed
, ―
Intrusion detection systems for IoT-based smart environments: a survey,
J. Cloud Comput.
, vol.
7
, no.
1
, p.
21
, Dec.
2018
.
16.
K.
Letou
,
D.
Devi
, and
Y. Jayanta
Singh
, ―
Host-based Intrusion Detection and Prevention System (HIDPS),
Int. J. Comput. Appl.
, vol.
69
, no.
26
, pp.
28
33
,
2013
.
17.
V.
Kumar
,
A. K.
Das
, and
D.
Sinha
, ―
UIDS: a unified intrusion detection system for IoT environment,
Evol. Intell.
, no. 0123456789,
2019
.
18.
N. M. Ayyaz-ul-Haq
Qureshi
,
Hadi
Larijani
,
Jawad
Ahmad
, in
Intelligent Computing, CompCom 2019, Advances
in
Intelligent Systems and Computing
,
2019
, pp.
86
98
This content is only available via PDF.
You do not currently have access to this content.