Security Analysis of IoT Devices by using Mobile Computing: A Systematic Literature Review

Bin Liao, Yasir Ali, Shah Nazir, Long He, Habib Ullah Khan
2020 IEEE Access  
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT.
more » ... In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research. INDEX TERMS Internet of Things devices, security, mobile computing, mobile applications, smartphone. VOLUME 8, 2020 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ 120332 VOLUME 8, 2020
doi:10.1109/access.2020.3006358 fatcat:sgcy7v6wkjarjd4ogt5p5ofnsm