Survey of Security and Privacy Issues of Internet of Things

This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Sugata Sanyal,et al.  Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services , 2013, ArXiv.

[3]  D. Lazer,et al.  Inferring Social Network Structure using Mobile Phone Data , 2006 .

[4]  Dharma P. Agrawal,et al.  Jigsaw-based secure data transfer over computer networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[6]  Sugata Sanyal,et al.  A new protocol to counter online dictionary attacks , 2006, Comput. Secur..

[7]  Rolf Clauberg,et al.  RFID and Sensor Networks From Sensor / Actuator to Business Application , 2004 .

[8]  Peter Kulchyski and , 2015 .

[10]  Kalpana Sharma,et al.  A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .

[11]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[12]  Mike Burmester,et al.  RFID Security : Attacks , Countermeasures and Challenges , 2007 .

[13]  Selwyn Piramuthu,et al.  Security/privacy of wearable fitness tracking IoT devices , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).

[14]  Qinghan Xiao,et al.  RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .

[15]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[16]  Jaydip Sen,et al.  Security and Privacy Challenges in Cognitive Wireless Sensor Networks , 2013, ArXiv.

[17]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[18]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[19]  Sugata Sanyal,et al.  The N/R one time password system , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[20]  Charu C. Aggarwal,et al.  Integrating Sensors and Social Networks , 2011, Social Network Data Analytics.

[21]  H. Schulzrinne,et al.  An IP traceback mechanism for reflective DoS attacks , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[22]  Ahmad Alkhatib,et al.  Wireless Sensor Network Architecture , 2012 .

[23]  Abhishek Pandey,et al.  A Survey on Wireless Sensor Networks Security , 2010 .

[24]  Amit Kumar Mishra,et al.  ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .

[25]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[26]  Sugata Sanyal,et al.  RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks , 2013, ArXiv.

[27]  Zornitza Genova Prodanoff Optimal frame size analysis for framed slotted ALOHA based RFID networks , 2010, Comput. Commun..

[28]  Al-Sakib Khan Pathan Denial of service in wireless sensor networks: issues and challenges , 2010 .

[29]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[30]  Jyoteesh Malhotra,et al.  Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[31]  Bingwu Liu,et al.  The visions, technologies, applications and security issues of Internet of Things , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[32]  Sugata Sanyal,et al.  An LSB Data Hiding Technique Using Prime Numbers , 2007, Third International Symposium on Information Assurance and Security.

[33]  Djamal Zeghlache,et al.  Towards a secure social sensor network , 2013, 2013 IEEE International Conference on Bioinformatics and Biomedicine.