A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT

Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT network leads the risk of security and confidentiality of data. This paper analyzes different security issues, their counter measures and discusses the future directions of security in IoT. Furthermore, this paper also discusses essential technologies of security like encryption in the scenario of IoT for the prevention of harmful threats in the light of latest research.

[1]  Jan L. Harrington Denial of Service Attacks , 2005 .

[2]  Jens-Peter E Kaps,et al.  Cryptography for Ultra-Low Power Devices , 2006 .

[3]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[4]  Ramaswamy Chandramouli,et al.  State of security readiness , 2010, CROS.

[5]  Julio C. Hernandez-Castro,et al.  Attacking RFID Systems , 2010 .

[6]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[7]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[8]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[9]  Kamal Dahbur,et al.  A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.

[10]  Wei You,et al.  E2E: An Optimized IPsec Architecture for Secure and Fast Offload , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[11]  Nagaraju Kilari,et al.  A Survey on Security Threats for Cloud Computing , 2012 .

[12]  Rakesh R. Bhavsar,et al.  Data Security over Cloud , 2012 .

[13]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[14]  Jinquan Zeng,et al.  Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.

[15]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[16]  Saeed Daneshmand,et al.  A Low-Complexity GPS Anti-Spoofing Method Using a Multi-Antenna Array , 2012 .

[17]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[18]  Patrick D. McDaniel,et al.  Semantically rich application-centric security in Android , 2012 .

[19]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[20]  Sarvesh Kumar,et al.  Virtualization, The Great Thing and Issues in Cloud Computing , 2013 .

[21]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[22]  Virendra Pal Singh,et al.  Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .

[23]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[24]  P. V. Dhawas,et al.  A Secured Cost Effective Multi-Cloud Storage in Cloud Computing , 2013 .

[25]  Hyunsoo Yoon,et al.  Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..

[26]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[27]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[28]  Michael Schukat,et al.  Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things , 2014, The 10th International Conference on Digital Technologies 2014.

[29]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[30]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[31]  David Lake,et al.  Internet of Things: Architectural Framework for eHealth Security , 2014, J. ICT Stand..

[32]  Arif Sari Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks , 2014 .

[33]  Yacine Challal,et al.  Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.

[34]  Sanggon Lee,et al.  Security Analysis and Improvements of Authentication and Access Control in the Internet of Things , 2014, Sensors.

[35]  Zahid Anwar,et al.  Semantic security against web application attacks , 2014, Inf. Sci..

[36]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[37]  Robert Green,et al.  Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.

[38]  Panwit Tuwanut,et al.  A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).

[39]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[40]  Jyoteesh Malhotra,et al.  Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[41]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[42]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[43]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[44]  Catalin Boja,et al.  Internet of Things Based Systems for Food Safety Management , 2015 .

[45]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[46]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[47]  C. Fung,et al.  Value analysis of cyber security based on attack types , 2015 .

[48]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[49]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[50]  Hon Sun Chiu,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[51]  Kanchan Kaushal,et al.  DoS Attacks on different Layers of WSN: A Review , 2015 .

[52]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[53]  Pg Student,et al.  A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network , 2015 .

[54]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[55]  Pascal Urien,et al.  A new approach to investigate IoT threats based on a four layer model , 2016, 2016 13th International Conference on New Technologies for Distributed Systems (NOTERE).

[56]  Arun Agarwal,et al.  Internet of Things (IoT) – A Technological Analysis and Survey on Vision, Concepts, Challenges, Innovation Directions, Technologies, and Applications ( An Upcoming or Future Generation Computer Communication System Technology ) , 2016 .

[57]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[58]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[59]  Reema Abdulraziq,et al.  Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): Survey , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[60]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[61]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[62]  Mohammad Hammoudeh,et al.  Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[63]  Maslina Daud,et al.  Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.

[64]  Miroslav Vujić,et al.  Classification of Security Risks in the IoT Environment , 2016 .

[65]  Youngseop Kim,et al.  An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).

[66]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[67]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[68]  N. Jeyanthi,et al.  Security in IoT Devices , 2021, Research Anthology on Combating Denial-of-Service Attacks.

[69]  Munam Ali Shah,et al.  IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).

[70]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[71]  Douglas C. Schmidt,et al.  Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..

[72]  Sayan Kumar Ray,et al.  A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .

[73]  Long Chen Security Management for The Internet of Things , 2017 .