A Review on Cyber Crimes on the Internet of Things

Internet of Things (IoT) devices are rapidly becoming universal. The success of IoT cannot be ignored in the scenario today, along with its attacks and threats on IoT devices and facilities are also increasing day by day. Cyber attacks become a part of IoT and affecting the life and society of users, so steps must be taken to defend cyber seriously. Cybercrimes threaten the infrastructure of governments and businesses globally and can damage the users in innumerable ways. With the global cybercrime damages predicted to cost up to 6 trillion dollars annually on the global economy by cyber crime. Estimated of 328 Million Dollar annual losses with the cyber attacks in Australia itself. Various steps are taken to slow down these attacks but unfortunately not able to achieve success properly. Therefor secure IoT is the need of this time and understanding of attacks and threats in IoT structure should be studied. The reasons for cyber-attacks can be Countries having week cyber securities, Cybercriminals use new technologies to attack, Cybercrime is possible with services and other business schemes. MSP (Managed Service Providers) face different difficulties in fighting with Cyber-crime. They have to ensure that security of the customer as well as their security in terms of their servers, devices, and systems. Hence, they must use effective, fast, and easily usable antivirus and antimalware tools.

[1]  Md. Rafiqul Islam,et al.  A Hybrid Wrapper-Filter Approach for Malware Detection , 1969, J. Networks.

[2]  Mohan Krishna Kagita AN UPDATED NEW SECURITY ARCHITECTURE FOR IOT NETWORK BASED ON SOFTWARE-DEFINED NETWORKING (SDN) , 2018 .

[3]  Ashutosh Mitbavkar,et al.  A Brief Study on Cyber Crime & Cyber Law’s of India , 2020 .

[4]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[5]  Sherali Zeadally,et al.  Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges , 2017, IEEE Communications Magazine.

[6]  Mohammad S. Obaidat,et al.  Ensuring Privacy and Security in E- Health Records , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).

[7]  Md Husamuddin,et al.  Internet of Things: A study on security and privacy threats , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[8]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[9]  Praveen Kumar Reddy Maddikunta,et al.  A metaheuristic optimization approach for energy efficiency in the IoT networks , 2020, Softw. Pract. Exp..

[10]  Wazir Zada Khan,et al.  A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks , 2020, IEEE Access.

[11]  Neeraj Kumar,et al.  Security and Trust Management in MANET , 2011 .

[12]  B. Prabadevi,et al.  An AI-based intelligent system for healthcare analysis using Ridge-Adaline Stochastic Gradient Descent Classifier , 2020, The Journal of Supercomputing.

[13]  Harshita Patel,et al.  A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.

[14]  Paul A. Watters,et al.  Information Security Governance: The Art of Detecting Hidden Malware , 2013 .

[15]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[16]  Neeraj Kumar,et al.  Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach , 2019, Comput. Electr. Eng..

[17]  Tero Päivärinta,et al.  Genre-Based Assessment of Information and Knowledge Security Risks , 2014, 2014 47th Hawaii International Conference on System Sciences.

[18]  Yang Lu,et al.  Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics , 2019, IEEE Internet of Things Journal.

[19]  Praveen Kumar Reddy Maddikunta,et al.  Predictive model for battery life in IoT networks , 2020, IET Intelligent Transport Systems.

[20]  Thippa Reddy Gadekallu,et al.  A Heuristic Angular Clustering Framework for Secured Statistical Data Aggregation in Sensor Networks , 2020, Sensors.

[21]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[22]  Praveen Kumar Reddy Maddikunta,et al.  A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU , 2020, Electronics.

[23]  Jonathan Oliver,et al.  Mining Malware to Detect Variants , 2014, 2014 Fifth Cybercrime and Trustworthy Computing Conference.

[24]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[25]  Praveen Kumar Reddy Maddikunta,et al.  An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..

[26]  Michael Schiefer Smart Home Definition and Security Threats , 2015, 2015 Ninth International Conference on IT Security Incident Management & IT Forensics.

[27]  Tin Maung Maung,et al.  Proposed Effective Solution for Cybercrime Investigation in Myanmar , 2017 .

[28]  Praveen Kumar Reddy Maddikunta,et al.  Green communication in IoT networks using a hybrid optimization algorithm , 2020, Comput. Commun..

[29]  Mohan Krishna Kagita,et al.  The Role of the Internet of Things in Health Care: A Systematic and Comprehensive Study , 2020, International Journal of Engineering and Management Research.

[30]  Roderic Broadhurst,et al.  Malicious Spam Emails Developments and Authorship Attribution , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.

[31]  Wazir Zada Khan,et al.  A deep neural networks based model for uninterrupted marine environment monitoring , 2020, Comput. Commun..

[32]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[33]  Laurence T. Yang,et al.  UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.

[34]  Gautam Srivastava,et al.  KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks , 2020, IEEE Access.

[35]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[36]  Lingfeng Wang,et al.  An information flow security model for home area network of smart grid , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.

[37]  Praveen Kumar Reddy Maddikunta,et al.  Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything , 2020, J. Parallel Distributed Comput..

[38]  Abdulrahman Al-Ahmari,et al.  Computational System to Classify Cyber Crime Offenses using Machine Learning , 2020, Sustainability.

[39]  Neeraj Kumar,et al.  Secure clustering for efficient data dissemination in vehicular cyber-physical systems , 2016, Future Gener. Comput. Syst..

[40]  David G. Holmberg,et al.  BACnet wide area network security threat assessment , 2011 .

[41]  Mohammad Sayad Haghighi,et al.  Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[42]  Gregory Epiphaniou,et al.  Guidelines for Internet of Things Deployment Approaches - The Thing Commandments , 2013, EUSPN/ICTH.

[44]  Nancy E. Marion The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation , 2010 .