TY - GEN
T1 - IoST
T2 - 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022
AU - Adil, Muhammad
AU - Attique, Muhammad
AU - Wang, Jian
AU - Alrefaei, Faisal
AU - Song, Houbing
AU - Farouk, Ahmed
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Internet of Softwarized Things (IoST) is a promising and dynamic programmable technology that has the capability to interconnect sensor devices with an objective to share the accumulated data in the network without the intervention of human beings. Despite its advantages, this technology suffers from numerous security vulnerability threats, which can damage the trust of clients. Therefore, it is very important to familiarize the readers, students, experts, and industry stakeholders working in this domain with the existing counteraction schemes followed by potential security threats. For redressal of identified security threats, the literature presents various schemes, but somehow they are unable to provide fool-proof security infrastructure for these networks, because the attackers work restlessly to compromise the new security countermeasure schemes. To explore this discussion and evaluate the open security challenges with future research directions, in this paper, we present a survey regarding the most recent published literature from 2020 to 2022. Following this, we have covered the architectural and interoperability literature in the context of security threats and their countermeasure techniques to identify the weak aspects of them. Based on underscored problems, we have highlighted the unresolved security challenges to set a footstep for the future research work that could be useful for all stakeholders associated with IoST technology.
AB - Internet of Softwarized Things (IoST) is a promising and dynamic programmable technology that has the capability to interconnect sensor devices with an objective to share the accumulated data in the network without the intervention of human beings. Despite its advantages, this technology suffers from numerous security vulnerability threats, which can damage the trust of clients. Therefore, it is very important to familiarize the readers, students, experts, and industry stakeholders working in this domain with the existing counteraction schemes followed by potential security threats. For redressal of identified security threats, the literature presents various schemes, but somehow they are unable to provide fool-proof security infrastructure for these networks, because the attackers work restlessly to compromise the new security countermeasure schemes. To explore this discussion and evaluate the open security challenges with future research directions, in this paper, we present a survey regarding the most recent published literature from 2020 to 2022. Following this, we have covered the architectural and interoperability literature in the context of security threats and their countermeasure techniques to identify the weak aspects of them. Based on underscored problems, we have highlighted the unresolved security challenges to set a footstep for the future research work that could be useful for all stakeholders associated with IoST technology.
KW - Data privacy and protection
KW - Device-to-Device authentication
KW - Interoperability security challenges
KW - IoST Technology
UR - http://www.scopus.com/inward/record.url?scp=85146847664&partnerID=8YFLogxK
U2 - 10.1109/GCWkshps56602.2022.10008746
DO - 10.1109/GCWkshps56602.2022.10008746
M3 - Conference contribution
AN - SCOPUS:85146847664
T3 - 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022 - Proceedings
SP - 269
EP - 274
BT - 2022 IEEE GLOBECOM Workshops, GC Wkshps 2022 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 4 December 2022 through 8 December 2022
ER -