An impact review on internet of things attacks

The heterogeneity of devices that can seamlessly connect to each other and be attached to human beings has given birth to a new computing epitome referred to as the Internet of Things. The connectivity and scalability of such technological waves could be harnessed to improve service delivery in many application areas as revealed by recent studies on the Internet of Things' interoperability. However, for the envisaged benefits to be yielded from Internet of Things there are many security issues to be addressed, which range from application environments security concerns, connection technology inbuilt security issues, scalability and manageability issues. Given the increasing number of objects or “things” that can connect to each other unsupervised, the complexity of such a network is presenting a great concern both for the future internet's security and reliable operation. The focus of this paper was to review the impact of some of the attacks attributable to internet of things. A desktop review of work done under this area, using the qualitative methodology was employed. This research may contribute towards a roadmap for security design and future research on internet of things scalability. The deployment of future applications around Internet of Things may receive valuable insight as the nature of attacks and their perceived impacts will be unveiled and possible solutions could be developed around them.

[1]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[2]  Chunquan Du,et al.  Research on Urban Public Safety Emergency Management Early Warning System based on Technologies for the Internet of Things , 2012 .

[3]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[5]  Parikshit N. Mahalle Identity Management Framework for Internet of Things , 2014 .

[6]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[7]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[8]  Luís M. Correia,et al.  An applications perspective into the Future Internet , 2013, J. Netw. Comput. Appl..

[9]  Ivana Murković Steinberg,et al.  Wireless smart tag with potentiometric input for ultra low-power chemical sensing , 2013 .

[10]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[11]  Faisal Razzak Spamming the Internet of Things: A Possibility and its probable Solution , 2012, ANT/MobiWIS.

[12]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[13]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[14]  Djamal Zeghlache,et al.  Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.

[15]  Han Li,et al.  Secure solution of trusted Internet of things base on TCM , 2013 .

[16]  Ju Chen,et al.  An Identity Management Framework for Internet of Things , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.

[17]  Jing Yu,et al.  A Study on the Fire IOT Development Strategy , 2013 .