Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats
##plugins.themes.academic_pro.article.main##
Abstract
The Internet of Things, often known as IoT, is a project whose ultimate objective is to construct, in the not-too-distant future, a global network of linked, networked goods and things that are capable of exchanging data and working together. Through the use of the internet, it will be possible to read, recognise, localise, address, and otherwise control such things. Before widespread usage of the Internet of Things (IoT), consumers and business owners need to have trust in its underlying security architecture. It is essential to provide an explanation of how different devices connected to the Internet of Things may safely and effectively share data with one another and with remote computers. When designing security solutions, new privacy and security issues brought about by the Internet of Things need to be taken into consideration throughout the design process. Establishing trustworthy end-to-end encrypted connections is difficult due to the inherent heterogeneity of Internet of Things (IoT) communications and the vast range of hardware and software capabilities supported by IoT devices. Because of their slow processing rates, high power consumption, and little quantities of memory, the majority of Internet of Things devices have few security choices available. This is as a result of the fact that many traditional security approaches are unable to be deployed on devices that have restricted resources. This article presents an overview of the many uses of the Internet of Things, together with the security threats and operational challenges that each presents.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- Raghuvanshi, U. K. Singh, P. P. e. 2020. Internet of things: Taxonomy of various attacks. In European Journal of Molecular and Clinical Medicine. pp. 3853–3864.
- Sastry, S. S. e. a. 2013. Security threats in wireless sensor networks in each layer. Inter- national Journal of Advanced Network Applications Vol.4, No.4, pp. 1657–1671.
- Almolhis, A. Alashjaee, e. a. 2020. The security issues in iot - cloud: A review. Proceedings of 16th IEEE International Colloquium on Signal Processing and Its Applications. CSPA. Ammar, R. and Crispo. 2018. Internet of things: A survey on the security of iot frameworks,. In Journal Of Information Security And Applications. JISAA, pp. 8–27. DOI: https://doi.org/10.1109/CSPA48992.2020.9068693
- B, B. K. 2011. Rfid as an enabler of the internet of things: issues of security and privacy. International Conference on Internet of Things (ithings/CPSCom) and 4th International Conference on Cyber, Physical and Social Computing. pp. 709–712.
- Zhu, A. J. e. a. 2011. A taxonomy of cyber attacks on scada systems. Proceedings of Internet of Things (Ithings/CPSCom),international conference on and 4th international conference on Cyber. Physical and Social Computing. DOI: https://doi.org/10.1109/iThings/CPSCom.2011.34
- Gulzar, B., & Gupta, A. (2021). DAM: A Theoretical Framework for SensorSecurity in IoT Applications. International Journal of Next-Generation Computing, 12(3), 309–327. https://doi.org/10.47164/ijngc.v12i3.830 DOI: https://doi.org/10.47164/ijngc.v12i3.830
- Catarinucci. 2015. An iot-aware architecture for smart healthcare systems. IEEE Internet of Things Journal. pp. 515-526. DOI: https://doi.org/10.1109/JIOT.2015.2417684
- Cho, Yeo, S. K. e. a. 2011. Securing against brute-force attack: a hash-based rfid mutual authentication protocol using a secret value. Computer Communication. pp.391–397. DOI: https://doi.org/10.1016/j.comcom.2010.02.029
- Welch, S. L. 2003. Wireless security threat taxonomy. IEEE Systems, Man and Cybernetics Society and Information Assurance Workshop. 76–83.
- Ding, Z. and Feng., B. 2008. A taxonomy model of rfid security threats. International Conference on Communication Technology. IEEE, ICCT. DOI: https://doi.org/10.1109/ICCT.2008.4716242
- Douceur, J. R. 2008. The sybil attack. In International Workshop on Peer-to-Peer Systems.
- Springer. 10.18535/ijecs/v6i4.41, pp. 251–260.
- Elbouanani, K. and Achbarou. 2015. Introduction to the internet of things security: Stan- dardization and research challenges. IAS Vol., https://doi.org/10.1109/isias.2015.7492741. DOI: https://doi.org/10.1109/ISIAS.2015.7492741
- F. Mattern, C. F. 2010. From the internet of computers to the internet of things. From active data management to eventbased systems and more. From active data management to eventbased systems and more. DOI: https://doi.org/10.1007/978-3-642-17226-7_15
- F. Shrouf, J. O. and Miragliotta, G. 2018. Smart factories in industry 4.0: A review of the concept and of energy management approached in production based on the internet of things paradigm. Proceedings of IEEE International Conference on Industrial Engineering and Engineering Management, Vol.12, No.4 (May), pp. 697–701. IEEE.
- Fernandes, J. Jung, A. P. e. a. 2016. Security analysis of emerging smart home applications. Proceedings of IEEE Symposium on Security and Privacy Vol.12, No.1, pp. 636–654. SP. DOI: https://doi.org/10.1109/SP.2016.44
- Jensen, S. e. a. 2009. On technical security issues in cloud computing. Proceedings of IEEE In- ternational Conference on Cloud Computing. CLOUD’09, IEEE) Vol.1, No.1, pp. 109–1161.
- Jia, Q. A. C. and et. al., S. W. 2017. Contexiot: towards providing contextual integrity to appified iot platforms. In: Proceedings of the 21st Network and Distributed System Security Symposium. NDSS. DOI: https://doi.org/10.14722/ndss.2017.23051
- Kahate, S. and Raut, A. 2022. Comprehensive analysis of privacy attacks in online social network: Security issues and challenges. International Journal of Safety and Security En- gineering Vol.12, No.4 (August), pp. 507–518. https://doi.org/10.18280/ijsse.120412. DOI: https://doi.org/10.18280/ijsse.120412
- M. Farooq, M. W. e. a. 2015. A critical analysis on the security concerns of internet of things (iot). International Journal of Computer Applications. . DOI: https://doi.org/10.5120/19547-1280
- M. Khalid, M. Murtaza, e. a. 2020. Study of security and privacy issues in internet of things. Proceedings of 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications. DOI: https://doi.org/10.1109/CITISIA50690.2020.9371828
- Mitrokotsa, M. e. a. 2008. Classification of rfid attacks. IEEE Global Engineering Education Conference. Gen 15693:14443 (Oct), pp. 32–37.
- O. Elijah, T. A. Rahman, e. a. 2018. An overview of internet of things (iot) and data analytics in agriculture: Benefits and challenges. IEEE Internet of Things Journal. pp. 3758-3773. DOI: https://doi.org/10.1109/JIOT.2018.2844296
- Padmavathi and Shanmugapriya, M. 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security.
- Q. Zhang, X. W. 2009. Sql injections through back-end of rfid system. Proceedings of Interna- tional Symposium on Computer Network and Multimedia Technolog Vol., pp.1–4. DOI: https://doi.org/10.1109/CNMT.2009.5374533
- R. AL MOGBIL, M. AL ASQAH, e. a. 2020. Iot: Security challenges and issues of smart homes/cities. Proceedings of International Conference on Computing and Information Tech- nology. ICCIT-1441. DOI: https://doi.org/10.1109/ICCIT-144147971.2020.9213827
- Khan, S. K. e. a. 2012. Future internet: the internet of things architecture, possible applica- tions and key challenges. International Conference on Frontiers of Information Technology. Raghuvanshi, Singh, B. e. a. 2020. An investigation on detection of vulnerabilities in inter- net of things. European Journal of Molecular and Clinical Medicine Vol.107, No.10, pp. 3289–3299. DOI: https://doi.org/10.1109/FIT.2012.53
- Simmons, Ellis, e. a. 2014. A cyber attack taxonomy. International Conference on Information Technology. In: 9th Annu Symp Inf Assur.
- W. Zhang, B. Qu, e. a. 2013. Security architecture of the internet of things oriented to perceptual layer. International Journal on Computer, Consumer and Control Vol.2, pp. 37–45.
- Yampolskiy, Horvath, K. e. a. 2013. Taxonomy for description of cross-domain attacks on cps. IEEE 4th International Conference on MOOCs, Innovation and Technology in Educa- tion Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems. ACM. DOI: https://doi.org/10.1145/2461446.2461465
- Z. Yang, Y. Yue, Y. Y. e. a. 2011. Study and application on the architecture and key technologies for iot. International Conference On Multimedia Technology. https://doi.org/10.1109/icmt.2011.6002149. DOI: https://doi.org/10.1109/ICMT.2011.6002149
- Zafeiriou, I. 2020. Iot and mobility in smart cities. In Proceedings of 3rd World Symposium on Communication Engineering. WSCE, pp.91–95. DOI: https://doi.org/10.1109/WSCE51339.2020.9275584