Abstract
The term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT systems frequently use messaging protocols to exchange IoT data. IoT security must be established using advanced techniques as it is vulnerable to many threats. The primary objectives of IoT security are to protect customer privacy, data integrity, and confidentiality, as well as the security of assets and IoT devices and the accessibility of services provided by an IoT ecosystem. In this regard, the IoT must meet user demands while consuming the least number of resources, including money, vitality, and time. The proposed research work is organized into numerous categories to make it easier for researchers and readers to solve and understand security problems in IOT devices. The categories “Features” are identified from available literature, and a specific criterion is adopted for choosing alternatives. The entropy approach to determine criterion relevance by calculating features weights is utilized. The second method “EDAS” approach is used and the alternatives are sorted chronologically based on the criterion weights for easy identification and selection of an effective alternative. Finally, all alternatives are precisely analyzed and ranked. Using our research method, various appropriate features are extracted and are evaluated to solve security issue within IoT devices. The most significant features are ranked to help researchers and manufacturers to focus on security-related issues in IoT devices.
Similar content being viewed by others
Data availability
The dataset used for this study is available on reasonable request from the corresponding author.
References
Whitmore A, Agarwal A, Da Xu L (2015) The Internet of Things—a survey of topics and trends. Inf Syst Front 17:261–274
Feki MA et al (2013) The internet of things: the next technological revolution. Computer 46(2):24–25
Mosenia A, Jha NK (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602
Ray PP (2018) A survey on Internet of Things architectures. J King Saud Univ-Comput Inf Sci 30(3):291–319
Perera C et al (2014) A survey on internet of things from industrial market perspective. IEEE Access 2:1660–1679
Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58:49–69
Li S, Xu LD, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17:243–259
Wortmann F, Flüchter K (2015) Internet of things: technology and value added. Bus Inf Syst Eng 57:221–224
Zanella A et al (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32
Zheng J et al (2011) The internet of things [Guest Editorial]. IEEE Commun Mag 49(11):30–31
Cao J, Zhu T, Ma R, Guo Z, Zhang Y, Li H (2022) A software-based remote attestation scheme for internet of things devices. IEEE Trans Dependable Secure Comput 20:1422–1434
Guo Y, Xie H, Wang C, Jia X (2021) Enabling privacy-preserving geographic range query in fog-enhanced iot services. IEEE Trans Dependable Secure Comput 19(5):3401–3416
Hayat RF, Aurangzeb S, Aleem M, Srivastava G, Lin JC (2022) ML-DDoS: a blockchain-based multilevel DDoS mitigation mechanism for IoT environments. IEEE Trans Eng Manag. https://doi.org/10.1109/TEM.2022.3170519
Heer T et al (2011) Security challenges in the IP-based internet of things. Wirel Pers Commun 61:527–542
Xing L (2020) Reliability in Internet of Things: current status and future perspectives. IEEE Internet Things J 7(8):6704–6721
Baldini G et al (2018) Ethical design in the internet of things. Sci Eng Ethics 24:905–925
Sanislav T et al (2021) Energy harvesting techniques for internet of things (IoT). IEEE Access 9:39530–39549
Neisse R et al (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76
Lv Z (2020) Virtual reality in the context of Internet of Things. Neural Comput Appl 32(13):9593–9602
Kumar S, Tiwari P, Zymbler M (2019) Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 6(1):1–21
Khan HU, Sohail M, Ali F, Nazir S, Ghadi YY, Ullah I (2023) Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Phys Commun 1(59):102084
Golmaryami M, Taheri R, Pooranian Z, Shojafar M, Xiao P (2022) SETTI: a self-supervised adversarial malware detection architecture in an IoT environment. ACM Trans Multimed Comput Commun Appl 18(2):1–21
Ali MS et al (2018) Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tutor 21(2):1676–1717
Sun C (2012) Application of RFID technology for logistics on internet of things. AASRI Proc 1:106–111
George G, Thampi SM (2020) Combinatorial analysis for securing IoT-assisted Industry 4.0 applications from vulnerability-based attacks. IEEE Trans Ind Inform 18(1):3–15
Alam S, Chowdhury MM, Noll J (2011) Interoperability of security-enabled internet of things. Wirel Pers Commun 61:567–586
Mezzanotte P et al (2021) Innovative RFID sensors for Internet of Things applications. IEEE J Microw 1(1):55–65
Huckle S et al (2016) Internet of things, blockchain and shared economy applications. Proc Comput Sci 98:461–466
Tsai C-W, Lai C-F, Vasilakos AV (2014) Future internet of things: open issues and challenges. Wirel Netw 20:2201–2217
Brooks C et al (2018) A component architecture for the internet of things. Proc IEEE 106(9):1527–1542
Liang F et al (2019) Machine learning for security and the internet of things: the good, the bad, and the ugly. IEEE Access 7:158126–158147
Al-Qaseemi SA, Almulhim HA, Almulhim MF, and Chaudhry SR (2016) IoT Architecture Challenges and Issues: Lack of Standardization. In: 2016 Future Technologies Conference (FTC), pp. 731–738. IEEE
Khan HU, Sohail M, Nazir S (2022) Features-based IoT security authentication framework using statistical aggregation, entropy, and MOORA approaches. IEEE Access 10:109326–109339
Abellana DPM, Roxas RR, Lao DM, Mayol PE, Lee S (2022) Ensemble feature selection in binary machine learning classification: A novel application of the evaluation based on distance from average solution (EDAS) method. Math Probl Eng 2022:1–13
Funding
This research received no external funding.
Author information
Authors and Affiliations
Contributions
I.U. was involved in conceptualization, data curation, methodology, and hardware. I.U., A.N., and F.A. were involved in formal analysis. I.U. and A.N. contributed to software; S.N. was involved in supervision; F.A. and Y.Y.G. were involved in visualization; I.U. and F.A. were involved in writing—original draft; and A.N., F.A., S.N., Y.Y.G., and N.A. were involved in writing—review and editing. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interests.
Ethical approval
Not applicable.
Consent for publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ullah, I., Noor, A., Nazir, S. et al. Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J Supercomput 80, 5870–5899 (2024). https://doi.org/10.1007/s11227-023-05685-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05685-3