A survey of security and privacy issues in the Internet of Things from the layered context

Samundra Deep, Xi Zheng, Alireza Jolfaei, Dongjin Yu, Pouya Ostovari, Ali Kashif Bashir

Research output: Contribution to journalArticlepeer-review

51 Citations (Scopus)


Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store it online. The security of collected data is a big concern in recent times. As devices are becoming increasingly connected, privacy and security issues become more and more critical and these need to be addressed on an urgent basis. IoT implementations and devices are eminently prone to threats that could compromise the security and privacy of the consumers, which, in turn, could influence its practical deployment. In recent past, some research has been carried out to secure IoT devices with an intention to alleviate the security concerns of users. There have been research on blockchain technologies to tackle the privacy and security issues of the collected data in IoT. The purpose of this paper is to highlight the security and privacy issues in IoT systems. To this effect, the paper examines the security issues at each layer in the IoT protocol stack, identifies the under-lying challenges and key security requirements and provides a brief overview of existing security solutions to safeguard the IoT from the layered context.

Original languageEnglish
Article numbere3935
Number of pages20
JournalTransactions on Emerging Telecommunications Technologies
Issue number6
Publication statusPublished - Jun 2022
Externally publishedYes


  • Internet of Things
  • IoT
  • personal data
  • security
  • privacy


Dive into the research topics of 'A survey of security and privacy issues in the Internet of Things from the layered context'. Together they form a unique fingerprint.

Cite this