Problematic aspects of IoT cybersecurity standardisation
Abstract
The popularity of IoT devices is gaining interest among consumers. The growing number of consumers benefiting from IoT devices and the use of IoT technologies has increased the risk of cyberattacks. The Internet of Things is an important “crossroads” for several technologies. As a result, it is possible to connect smart physical goods and enable smart decision-making in a wide range of applications. Different devices, including computers, actuators and sensors, can connect to each other and exchange data in a networked environment. The supply of smart objects on the market is growing, so ensuring their security is becoming increasingly important.
The main problem with IoT devices is related to privacy and security. The administration of large amounts of data for reliable and secure processing is a real challenge. There are also issues of user protection, security and privacy. The cybersecurity and privacy of IoT consumers can be negatively affected by the development of these technologies if vulnerable devices and their environments are used. Therefore, there is a problem of information protection of IoT devices. To address this problem, a large number of technologies and standards have been created to ensure cybersecurity of the Internet of Things. In addition, there are a large number of necessary and important requirements to ensure protection against cyber attacks on IoT devices. All of this necessitates an analysis of the effectiveness of all these programmes and their scope for ensuring the cybersecurity of IoT environments.
To be successful, these programmes need to define the characteristics of IoT environments. The security standards, advanced technologies for solving security problems, and applications for analysing the current security structure make up the research taxonomy of the Internet of Things.
The article is a more comprehensive study than many previous ones on the topic of cybersecurity of the Internet of Things. It analyses the problematic aspects of standardisation related to the cybersecurity of the Internet of Things and examines the activities of international organisations for the standardisation of the Internet of Things.
Downloads
References
Aazam, M., Zeadally, S., & Harras, K. A. (2018). Fog computing architecture, evaluation, and future research directions. Communications Magazine, 56(5), 46–52. https://doi.org/10.1109/MCOM.2018.1700707.
AboBakr, A., & Azer, M. A. (2017, December 19–20). IoT Ethics Challenges and Legal Issues [Conference presentation abstract]. 12th International Conference on Computer Engineering and Systems, Cairo, Egypt. https://doi.org/10.1109/ICCES.2017.8275309.
Alhalafi, N., & Veeraraghavan, P. (2019, April 25–27). Privacy and Security Challenges and Solutions in IoT: A review [Conference presentation abstract]. International Conference on Smart Power & Internet Energy Systems, Melbourne, Australia. https://doi.org/10.1088/1755-1315/322/1/012013.
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27. https://doi.org/10.1016/j.jisa.2017.11.002.
Belkeziz, R., & Jarir, Z. (2020). An Overview of the IoT Coordination Challenge. International Journal of Service Science, Management, Engineering, and Technology, 11(1), 99–115. https://doi.org/10.4018/IJSSMET.2020010107.
Bhardwaj, A., & Kumar, V. (2021). Electronic Healthcare Records: Indian vs International Perspective on Standards and Privacy. International Journal of Service Science, Management, Engineering, and Technology, 12(2), 44–58. https://doi.org/10.4018/IJSSMET.2021030103.
Brass, I., Tanczer, L., Carr, M., Elsden, M., & Blackstock, J. (2018, March 28–29). Standardising A Moving Target: The Development and Evolution of IoT Security Standards [Conference presentation abstract]. Proceedings of Living in the Internet of Things: Cybersecurity of the IoT, London, United Kingdom. https://doi.org/10.1049/cp.2018.0024.
Butun, I, Sari, A, & Österberg, P. (2020). Hardware Security of Fog End-Devices for the Internet of Things. Sensors, 20(20). https://doi.org/10.3390/s20205729.
Choudhary, S., & Meena, G. (2022). Internet of Things: Protocols, Applications and Security Issues. Procedia Computer Science, 215, 274–288. https://doi.org/10.1016/j.procs.2022.12.030.
Guerbouj, S. S. E., Gharsellaoui, H., & Bouamama, S. (2019). A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things. International Journal of Service Science, Management, Engineering, and Technology, 10(3), 32–44. https://doi.org/10.4018/IJSSMET.2019070103.
Hou, J., Qu, L., & Shi, W. (2019). A survey on Internet of Things security from data perspectives. Computer Networks, 148(2), 295–306. https://doi.org/10.1016/j.comnet.2018.11.026.
Hwang, I., & Kim, Y. G. (2017, February 13–15). Analysis of security standardization for the Internet of Things [Conference presentation abstract]. International Conference on Platform Technology and Service, Busan, Korea (South). https://doi.org/10.1109/PlatCon.2017.7883687.
Karie, N. M., Sahri, N. M., Yang, W., Valli, C., & Kebande, V. R. (2021). A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access, 9, 121975–121995. https://doi.org/ 10.1109/ACCESS.2021.3109886.
Khan, G., Gola, K. K., Kanauzia, R., & Kumar, S. (2022). Secure Architecture to Support IoT based on Fog Computing. Procedia Computer Science, 215(2), 608–617. https://doi.org/10.1016/j.procs.2022.12.063.
Klimushyn, P. S., Roh, V. Ye., & Kolisnyk, T. P. (2023). Legal aspects of functional security standardisation of the Internet of Things. Law and Safety, 3(90), 200–213. https://doi.org/10.32631/pb.2023.3.17.
Kumar, V., & Pradhan, P. (2020). Trust Management: Social vs Digital Identity. International Journal of Service Science, Management, Engineering, and Technology, 11(4), 26–44. https://doi.org/10.4018/IJSSMET.2020100102.
Lata, M, & Kumar, V. (2021). Standards and Regulatory Compliances for IoT Security. International Journal of Service Science, Management, Engineering, and Technology, 12(5), 132–147. https://doi.org/10.4018/IJSSMET.2021090109.
Lee, E., Seo, Y. D., Oh, S. R., & Kim, Y. G. (2021). A Survey on Standards for Interoperability and Security in the Internet of Things. Communications Surveys and Tutorials, 23(2), 1020–1047. https://doi.org/10.1109/COMST.2021.3067354.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. Internet of Things Journal, 4(5), 1125–1142. https://doi.org/10.1109/JIOT.2017.2683200.
Lounis, K., & Zulkernine, M. (2020). Attacks and defenses in short-range wireless technologies for IoT. IEEE Access, 8, 88892–88932. https://doi.org/10.1109/ACCESS.2020.2993553.
Mansour, M., Gamal, A., Ahmed, A. I., Said, L. A., Elbaz, A., Herencsar, N., & Soltan, A. (2023). Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions. Energies, 16, 34–65. https://doi.org/10.3390/en16083465.
Mendez, D. M., Papapanagiotou, I., & Yang, B. (2018). Internet of Things: Survey on security and privacy. Information Security Journal: A Global Perspective, 27(3), 162–182. https://doi.org/10.1080/19393555.2018.1458258.
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of Internet of Things. Internet of Things Journal, 7(6), 4682–4696. https://doi.org/10.1109/JIOT.2020.2969326.
Sabireen, H., & Neelanarayanan, V. (2021). A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express, 7(2), 162–176. https://doi.org/10.1016/j.icte.2021.05.004.
Sain, M., Kang, Y. J., & Lee, H. J. (2017, February 19–22). Survey on security in Internet of Things: state of the art and challenges [Conference presentation abstract]. International Conference on Advanced Communication Technology, PyeongChang, Korea (South). https://doi.org/10.23919/ICACT.2017.7890183.
Singh, J., & Kumar, V. (2021). End User Driven Approach for Regulatory Compliance in Public Cloud. International Journal of Service Science, Management, Engineering, and Technology, 12(3). https://doi.org/10.4018/IJSSMET.2021050101.
Tournier, J., Lesueur, F., Mouël, F. L., Guyon, L., & Ben-Hassine, H. (2021). A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, 16. https://doi.org/10.1016/j.iot.2020.100264.
Virat, M. S., Bindu, S. M., Aishwarya, B., Dhanush, B. N., & Kounte, M. R. (2018, May 11–12). Security and Privacy Challenges in Internet of Things [Conference presentation abstract]. 2nd International Conference on Trends in Electronics and Informatics, Tirunelveli, India. https://doi.org/10.1109/ICOEI.2018.8553919.
Wang, W., & Yongchareon, S. (2020). Security-as-a-service: a literature review. International Journal of Web Information Systems, 16(5), 493–517. https://doi.org/10.1108/IJWIS-06-2020-0031.
Yu, J. Y., Lee, E., Oh, S. R., Seo, Y. D., & Kim, Y. G. (2020). A survey on security requirements for WSNs: Focusing on the characteristics related to security. IEEE Access, 8, 45304–45324. https://doi.org/10.1109/ACCESS.2020.2977778.
Zhurylo, O. D., Liashenko, O. S., & Avetisova, K. A. (2023). Hardware security overview of fog computing end devices in the Internet of Things. Innovative Technologies and Scientific Solutions for Industries, 1(23), 57–71. https://doi.org/10.30837/ITSSI.2023.23.057.
Copyright (c) 2025 P. S. Klimushyn

This work is licensed under a Creative Commons Attribution 4.0 International License.