Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats

##plugins.themes.academic_pro.article.main##

Boussaadi Smail
Dr. Domenic T. Sanchez
Dr. Larry B. Peconcillo Jr.
Dr. John V. De Vera
Dr. AL D. Horteza
Malik Jawarneh
Dr.Meenakshi .

Abstract

The Internet of Things, often known as IoT, is a project whose ultimate objective is to construct, in the not-too-distant future, a global network of linked, networked goods and things that are capable of exchanging data and working together. Through the use of the internet, it will be possible to read, recognise, localise, address, and otherwise control such things. Before widespread usage of the Internet of Things (IoT), consumers and business owners need to have trust in its underlying security architecture. It is essential to provide an explanation of how different devices connected to the Internet of Things may safely and effectively share data with one another and with remote computers. When designing security solutions, new privacy and security issues brought about by the Internet of Things need to be taken into consideration throughout the design process. Establishing trustworthy end-to-end encrypted connections is difficult due to the inherent heterogeneity of Internet of Things (IoT) communications and the vast range of hardware and software capabilities supported by IoT devices. Because of their slow processing rates, high power consumption, and little quantities of memory, the majority of Internet of Things devices have few security choices available. This is as a result of the fact that many traditional security approaches are unable to be deployed on devices that have restricted resources. This article presents an overview of the many uses of the Internet of Things, together with the security threats and operational challenges that each presents.

##plugins.themes.academic_pro.article.details##

How to Cite
Smail, B., Sanchez, D. D. T., Peconcillo Jr., D. L. B. ., De Vera, D. J. V. ., Horteza , . D. A. D. ., Jawarneh, . M. ., & ., D. (2022). Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.841

References

  1. Raghuvanshi, U. K. Singh, P. P. e. 2020. Internet of things: Taxonomy of various attacks. In European Journal of Molecular and Clinical Medicine. pp. 3853–3864.
  2. Sastry, S. S. e. a. 2013. Security threats in wireless sensor networks in each layer. Inter- national Journal of Advanced Network Applications Vol.4, No.4, pp. 1657–1671.
  3. Almolhis, A. Alashjaee, e. a. 2020. The security issues in iot - cloud: A review. Proceedings of 16th IEEE International Colloquium on Signal Processing and Its Applications. CSPA. Ammar, R. and Crispo. 2018. Internet of things: A survey on the security of iot frameworks,. In Journal Of Information Security And Applications. JISAA, pp. 8–27. DOI: https://doi.org/10.1109/CSPA48992.2020.9068693
  4. B, B. K. 2011. Rfid as an enabler of the internet of things: issues of security and privacy. International Conference on Internet of Things (ithings/CPSCom) and 4th International Conference on Cyber, Physical and Social Computing. pp. 709–712.
  5. Zhu, A. J. e. a. 2011. A taxonomy of cyber attacks on scada systems. Proceedings of Internet of Things (Ithings/CPSCom),international conference on and 4th international conference on Cyber. Physical and Social Computing. DOI: https://doi.org/10.1109/iThings/CPSCom.2011.34
  6. Gulzar, B., & Gupta, A. (2021). DAM: A Theoretical Framework for SensorSecurity in IoT Applications. International Journal of Next-Generation Computing, 12(3), 309–327. https://doi.org/10.47164/ijngc.v12i3.830 DOI: https://doi.org/10.47164/ijngc.v12i3.830
  7. Catarinucci. 2015. An iot-aware architecture for smart healthcare systems. IEEE Internet of Things Journal. pp. 515-526. DOI: https://doi.org/10.1109/JIOT.2015.2417684
  8. Cho, Yeo, S. K. e. a. 2011. Securing against brute-force attack: a hash-based rfid mutual authentication protocol using a secret value. Computer Communication. pp.391–397. DOI: https://doi.org/10.1016/j.comcom.2010.02.029
  9. Welch, S. L. 2003. Wireless security threat taxonomy. IEEE Systems, Man and Cybernetics Society and Information Assurance Workshop. 76–83.
  10. Ding, Z. and Feng., B. 2008. A taxonomy model of rfid security threats. International Conference on Communication Technology. IEEE, ICCT. DOI: https://doi.org/10.1109/ICCT.2008.4716242
  11. Douceur, J. R. 2008. The sybil attack. In International Workshop on Peer-to-Peer Systems.
  12. Springer. 10.18535/ijecs/v6i4.41, pp. 251–260.
  13. Elbouanani, K. and Achbarou. 2015. Introduction to the internet of things security: Stan- dardization and research challenges. IAS Vol., https://doi.org/10.1109/isias.2015.7492741. DOI: https://doi.org/10.1109/ISIAS.2015.7492741
  14. F. Mattern, C. F. 2010. From the internet of computers to the internet of things. From active data management to eventbased systems and more. From active data management to eventbased systems and more. DOI: https://doi.org/10.1007/978-3-642-17226-7_15
  15. F. Shrouf, J. O. and Miragliotta, G. 2018. Smart factories in industry 4.0: A review of the concept and of energy management approached in production based on the internet of things paradigm. Proceedings of IEEE International Conference on Industrial Engineering and Engineering Management, Vol.12, No.4 (May), pp. 697–701. IEEE.
  16. Fernandes, J. Jung, A. P. e. a. 2016. Security analysis of emerging smart home applications. Proceedings of IEEE Symposium on Security and Privacy Vol.12, No.1, pp. 636–654. SP. DOI: https://doi.org/10.1109/SP.2016.44
  17. Jensen, S. e. a. 2009. On technical security issues in cloud computing. Proceedings of IEEE In- ternational Conference on Cloud Computing. CLOUD’09, IEEE) Vol.1, No.1, pp. 109–1161.
  18. Jia, Q. A. C. and et. al., S. W. 2017. Contexiot: towards providing contextual integrity to appified iot platforms. In: Proceedings of the 21st Network and Distributed System Security Symposium. NDSS. DOI: https://doi.org/10.14722/ndss.2017.23051
  19. Kahate, S. and Raut, A. 2022. Comprehensive analysis of privacy attacks in online social network: Security issues and challenges. International Journal of Safety and Security En- gineering Vol.12, No.4 (August), pp. 507–518. https://doi.org/10.18280/ijsse.120412. DOI: https://doi.org/10.18280/ijsse.120412
  20. M. Farooq, M. W. e. a. 2015. A critical analysis on the security concerns of internet of things (iot). International Journal of Computer Applications. . DOI: https://doi.org/10.5120/19547-1280
  21. M. Khalid, M. Murtaza, e. a. 2020. Study of security and privacy issues in internet of things. Proceedings of 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications. DOI: https://doi.org/10.1109/CITISIA50690.2020.9371828
  22. Mitrokotsa, M. e. a. 2008. Classification of rfid attacks. IEEE Global Engineering Education Conference. Gen 15693:14443 (Oct), pp. 32–37.
  23. O. Elijah, T. A. Rahman, e. a. 2018. An overview of internet of things (iot) and data analytics in agriculture: Benefits and challenges. IEEE Internet of Things Journal. pp. 3758-3773. DOI: https://doi.org/10.1109/JIOT.2018.2844296
  24. Padmavathi and Shanmugapriya, M. 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security.
  25. Q. Zhang, X. W. 2009. Sql injections through back-end of rfid system. Proceedings of Interna- tional Symposium on Computer Network and Multimedia Technolog Vol., pp.1–4. DOI: https://doi.org/10.1109/CNMT.2009.5374533
  26. R. AL MOGBIL, M. AL ASQAH, e. a. 2020. Iot: Security challenges and issues of smart homes/cities. Proceedings of International Conference on Computing and Information Tech- nology. ICCIT-1441. DOI: https://doi.org/10.1109/ICCIT-144147971.2020.9213827
  27. Khan, S. K. e. a. 2012. Future internet: the internet of things architecture, possible applica- tions and key challenges. International Conference on Frontiers of Information Technology. Raghuvanshi, Singh, B. e. a. 2020. An investigation on detection of vulnerabilities in inter- net of things. European Journal of Molecular and Clinical Medicine Vol.107, No.10, pp. 3289–3299. DOI: https://doi.org/10.1109/FIT.2012.53
  28. Simmons, Ellis, e. a. 2014. A cyber attack taxonomy. International Conference on Information Technology. In: 9th Annu Symp Inf Assur.
  29. W. Zhang, B. Qu, e. a. 2013. Security architecture of the internet of things oriented to perceptual layer. International Journal on Computer, Consumer and Control Vol.2, pp. 37–45.
  30. Yampolskiy, Horvath, K. e. a. 2013. Taxonomy for description of cross-domain attacks on cps. IEEE 4th International Conference on MOOCs, Innovation and Technology in Educa- tion Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems. ACM. DOI: https://doi.org/10.1145/2461446.2461465
  31. Z. Yang, Y. Yue, Y. Y. e. a. 2011. Study and application on the architecture and key technologies for iot. International Conference On Multimedia Technology. https://doi.org/10.1109/icmt.2011.6002149. DOI: https://doi.org/10.1109/ICMT.2011.6002149
  32. Zafeiriou, I. 2020. Iot and mobility in smart cities. In Proceedings of 3rd World Symposium on Communication Engineering. WSCE, pp.91–95. DOI: https://doi.org/10.1109/WSCE51339.2020.9275584