Survey on Internet of Things (IoT) security issues & solutions

Internet of things (IOT) is a rising wireless technology that connects different things to the internet. Things can be “anything” that is around us. ‘Over 50 billion one-of-a-kind gadgets can be related to the IoT through 2020’ said through Cisco. Contemporary security technologies are very constrained as they may be unable to fulfil safety requirements of IoT devices. As Cisco said, in coming years the growth of IoT can be progressive but at the equal time we need to offer a strong provision for security of user's data. In this paper, we can consciousness on specific vulnerabilities to the security of IoT devices and provide possible solution to them.

[1]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[2]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[3]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[4]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[5]  Benjamin K. S. Khoo,et al.  RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[6]  Xinyu Yang,et al.  Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[7]  Raj Kulkarni,et al.  Internet of Things: Architecture and Security , 2014 .

[8]  Chen Wei,et al.  Security Characteristic and Technology in the Internet of Things , 2010 .

[9]  Ayman I. Kayssi,et al.  IP Spoofing Detection Using Modified Hop Count , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[10]  Shancang Li Security Architecture in the Internet of Things , 2017 .

[11]  Xiao Feng Wang,et al.  Research on Security Issues of the Internet of Things , 2014, CIT 2014.

[12]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[13]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[14]  Xun Wang,et al.  Detecting worms via mining dynamic program execution , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[15]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[16]  Panwit Tuwanut,et al.  A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[17]  Yassine Maleh,et al.  A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.

[18]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[19]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[20]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[21]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .

[22]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[23]  Xinyu Yang,et al.  A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems , 2012, IEEE Transactions on Computers.

[24]  Shuang-Hua Yang,et al.  RFID Sensor Network Network Architectures to Integrate RFID, Sensor and WSN , 2007 .

[25]  Sapna Chaudhary,et al.  Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .

[26]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[27]  Rinju Ravindran IoT : A REVIEW ON SECURITY ISSUES AND MEASURES , 2015 .