Recent Advances and Countermeasures Against Various Attacks in IoT Environment

Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.

[1]  Dogan Ibrahim,et al.  Security of the Internet of Things: An Overview , 2016, ICCIS '16.

[2]  Bharat Bhushan,et al.  Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey , 2017, 2017 International Conference on Computer, Communications and Electronics (Comptelix).

[3]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[4]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[5]  Davor Svetinovic,et al.  A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[6]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[7]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[8]  B. Etefia Routing Protocols for Wireless Sensor Networks , 2004 .

[9]  Munam Ali Shah,et al.  IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).

[10]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[11]  Md. Rafiqul Islam,et al.  A Study on the Security Issues in WSN , 2012 .

[12]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[13]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[14]  G. Sahoo,et al.  Man-in-the-middle attack in wireless and computer networking — A review , 2017, 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall).

[15]  Alessandro Neri,et al.  A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).

[16]  G. Sahoo,et al.  A comprehensive survey of secure and energy efficient routing protocols and data collection approaches in wireless sensor networks , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[17]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.