Adopting cyber security practices in Internet of Things: a review

Internet of Things (IoT), an emerging network of physical objects, acts as catalyst for the future connected world. It is estimated that there will be around 50 billion connected objects by year 2020. An IoT enabled connected world improves the way human live and interact with surroundings. Through IoT valuable information and services are available to humans on demand and in real time. But these information and services may also cause harm at certain level if not thoroughly observed. With the advent of IoT, the future of the connected world will face new types of security threats since more than half of the total connected objects today are exposed to such threats and vulnerability and this number may increase as more devices are getting connected to internet. Security is the major concern in designing IoT systems since the data collected by IoT objects may be critical and also data transmitted and processed by overall IoT system may be sensitive and may lead to issues with safety, privacy, authorization and authenticity etc. Therefore while taking advantage of IoT we must also consider the ways, to the highest possible degree, to prevent the future IoT connected world from harming us. Cyber security in IoT deals with protecting connected objects for data authorization, authentication, tempering and losses as well as identifying potential risks to the system. This paper provides a brief review on how to adopt security practices in designing IoT systems to make them secure and safe.

[1]  Vinay Soni,et al.  Detecting Sinkhole Attack in Wireless Sensor Network , 2013 .

[2]  Sergey Andreev,et al.  Internet of Things, Smart Spaces, and Next Generation Networking , 2013, Lecture Notes in Computer Science.

[3]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[4]  Jörg Daubert,et al.  On the Security and Privacy of Internet of Things Architectures and Systems , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).

[5]  Munam Ali Shah,et al.  IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).

[6]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[7]  Guangyi Xiao,et al.  User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.

[8]  Panwit Tuwanut,et al.  A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[9]  W. Marsden I and J , 2012 .

[10]  Patrick D. McDaniel,et al.  Semantically rich application-centric security in Android , 2012 .

[11]  Zhanyang Xu,et al.  A Density-based Energy-efficient Clustering Algorithm for Wireless Sensor Networks , 2013 .

[12]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[13]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[14]  Martin Bauer,et al.  Proceedings of the Federated Conference on Computer Science and Information Systems pp. 949–955 ISBN 978-83-60810-22-4 Service Modelling for the Internet of Things , 2022 .

[15]  Sapna Chaudhary,et al.  Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .

[16]  Paulo Veríssimo,et al.  Fundamental Security Concepts , 2001 .

[17]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[18]  Chen Wei,et al.  Security Characteristic and Technology in the Internet of Things , 2010 .

[19]  M. Alizadeh,et al.  Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID , 2012 .

[20]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[21]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[22]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[23]  Raj Kulkarni,et al.  Internet of Things: Architecture and Security , 2014 .

[24]  Hyunsoo Yoon,et al.  Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..

[25]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[26]  Rakesh R. Bhavsar,et al.  Data Security over Cloud , 2012 .

[27]  P. V. Dhawas,et al.  A Secured Cost Effective Multi-Cloud Storage in Cloud Computing , 2013 .

[28]  Hung-Min Sun,et al.  RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[29]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[30]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[31]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.