Classification of Various Types of Attacks in IoT Environment

IoT is one of the most expeditiously spreading technologies in our day to day life. It has a very significant role in our lives making a number of accessibility to many things. As the Internet of Things is widely utilized, there may be a chance of attacks in the security of various types of Internet of Things devices. To secure the devices from these assailments, some countermeasures must be taken. These countermeasures are utilized which avails the Internet of Things devices to be more secured to maintain their privacy and amends the security of the system. In this paper, we endeavor to highlight IoT security and privacy contravention through ostensibly with different angles. This paper represents the overview of Security Principles, Security Threats and Security challenges at the application layer and its countermeasures to surmount those challenges. We mainly focused on the various threats on the security of IoT devices and furthermore we have also discussed its precautions.

[1]  Xinyu Wang,et al.  An Adaptive Control Defense Scheme of False Data Injection Attacks in Smart Grids , 2019, 2019 3rd International Symposium on Autonomous Systems (ISAS).

[2]  Weixian Liao,et al.  Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.

[3]  Andrea Fumagalli,et al.  Internet of Things Security - Multilayered Method For End to End Data Communications Over Cellular Networks , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).

[4]  Shivam Shukla,et al.  Home Automation and Security using IoT - “Keyless Door Entry” , 2020 .

[5]  Murali Manohar,et al.  A Survey on Internet of Things: Case Studies, Applications, and Future Directions , 2017 .

[6]  Abbas Jamalipour,et al.  Software networks , 2016, Ann. des Télécommunications.

[7]  Tao Jiang,et al.  Cross-Technology Communications for Heterogeneous IoT Devices Through Artificial Doppler Shifts , 2018, IEEE Transactions on Wireless Communications.

[8]  Guangxia Xu,et al.  SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.

[9]  Gang Qu,et al.  Memristors for Secret Sharing-Based Lightweight Authentication , 2018, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[10]  Jian Wang,et al.  Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans , 2019, IEEE Internet of Things Journal.

[11]  Kenneth Li-Minn Ang,et al.  Application Specific Internet of Things (ASIoTs): Taxonomy, Applications, Use Case and Future Directions , 2019, IEEE Access.

[12]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[13]  Anthony T. Chronopoulos,et al.  Agent-based ARP cache poisoning detection in switched LAN environments , 2019, IET Networks.

[14]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[15]  Shalini Vermani,et al.  The next generation Internet of Things , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[16]  Xin He,et al.  Binary Data Gathering With a Helper in Internet of Things: Distortion Analysis and Performance Evaluation , 2019, IEEE Access.