Security attacks in IoT: A survey

Internet of Things (IoT) is one of the most buzzing and discussed topic in research field today. Some of the researchers are also looking future of the world in this technology. Since then significant research and development have taken place on IoT, however various vulnerabilities are observed which shall keep IoT as a technology in danger. As a result, there are so many attacks on IoT have been invented before actual commercial implementation of it. The present study discusses about various IoT attacks happening, classify them, its countermeasures and finding the most prominent attacks in IoT. A state of the art survey about the various attacks have been presented and compared including their efficiency and damage level in IoT.

[1]  Imran A. Zualkernan,et al.  Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures , 2015 .

[2]  Dhananjay Singh,et al.  A survey of Internet-of-Things: Future vision, architecture, challenges and services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[3]  R C Thool,et al.  UML Modeling of Physical and Data Link Layer Security Attacks in WSN , 2013 .

[4]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[5]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[6]  Bruce Schneier,et al.  Side channel cryptanalysis of product ciphers , 2000 .

[7]  Chonggang Wang,et al.  Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks , 2013, Secur. Commun. Networks.

[8]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[9]  Aikaterini Mitrokotsa,et al.  Classification of RFID Attacks , 2008, IWRT.

[10]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[11]  Pragya Jain,et al.  Defending against internet worms using honeyfarm , 2012, CUBE.

[12]  Hong Li,et al.  The Survey of RFID Attacks and Defenses , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[14]  Xin Zhou,et al.  Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.

[15]  Parminder Singh,et al.  Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack , 2014 .

[16]  Ibrahim Abdullah,et al.  Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count , 2015 .

[17]  Chonggang Wang,et al.  Colluding injected attack in mobile ad-hoc networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[18]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[19]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[20]  Udai Pratap Rao,et al.  Internet of Things — Architecture, applications, security and other major challenges , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[21]  Damon Reed,et al.  Applying the OSI Seven Layer Network Model To Information Security , 2004 .

[22]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[23]  Pg Student,et al.  A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network , 2015 .