Review of Analysis on IoT Components, Devices and Layers Security

Internet of Things (IoTs) continues to connect multifarious devices with the Internet and show exponential growth. Unhindered information exchange between these devices is critical for their proper functionality. With interconnectedness come the problems of ensuring security and protection from attacks. This review evaluates IoT attacks and security vulnerabilities on the hardware components and the architectural layers of the devices. Open areas for further research are identified to help isolate specific sections

[1]  Izzat Alsmadi,et al.  The malware detection challenge of accuracy , 2016, 2016 2nd International Conference on Open Source Software Computing (OSSCOM).

[2]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[3]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[4]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[5]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[6]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Stefan Mangard,et al.  Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices , 2016, IEEE Communications Surveys & Tutorials.

[8]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[9]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[10]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[11]  Jinquan Zeng,et al.  Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.

[12]  Lavinia Nastase,et al.  Security in the Internet of Things: A Survey on Application Layer Protocols , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[13]  Nikita Chavhan,et al.  False Data Detection in Wireless Sensor Network with Secure communication , 2011 .

[14]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[15]  Muhammad Imran Malik,et al.  XMPP architecture and security challenges in an IoT ecosystem , 2018 .

[16]  Sapna Chaudhary,et al.  Content Sniffing Attack Detection in Client and Server Side: A Survey , 2013 .

[17]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[18]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[19]  Liu Yang,et al.  Research on Security Issues of the Internet of Things , 2013 .

[20]  Ioannis Chatzigiannakis,et al.  A privacy-preserving smart parking system using an IoT elliptic curve based security platform , 2016, Comput. Commun..

[21]  Thomas Kunz,et al.  Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[22]  Weizhe Zhang,et al.  Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .

[23]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[24]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[25]  Resul Das,et al.  A comparison of cyber-security oriented testbeds for IoT-based smart grids , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).