Survey on IoT: Security Threats and Applications
DOI:
https://doi.org/10.18196/jrc.2150Keywords:
IoT, smart Homes, healthcare, Encryption, SecurityAbstract
the rapid growth of the internet of things (IoT) in the world in recent years is due to its wide range of usability, adaptability, and smartness. Most of the IoT applications are performing jobs an automatic manner without interactions of human or physical objects. It’s required that the current and upcoming devices will be smart, efficient and able to provide the services to the users to implement such a new technology with a secure manner. Thus the security issues are exploring day by day by the researchers. IoT devices are most portable and light in nature so it has several issues such as battery consumption, memory, and as these devices are working open range so the most important is security. In this survey paper, we have elaborated on the security attacks with reference to the different kinds of IoT layers. In the last, we have presented some of the applications of the IoT. This study will provide assistance to the researchers and manufacturers to evaluate and decrease the attacks range on IoT devices.References
V.HASSIJA1, V.CHAMOLA, V.SAXENA, D.JAIN, P.GOYAL & B.SIKDAR, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE, vol. 7, pp. 82721 - 82743, 2019.
M.Stoyanova, Y.Nikoloudakis, S. Panagiotakis, E.Pallis, & E. K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues," IEEE, pp. 1-38, 2020.
D.Sopori, T.Pawar, M.Patil, & R.Ravindran "Internet of Things: Security Threats," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 3, pp. 263-267, 2017.
A.Jain, B.Sharma, & P.Gupta "INTERNET OF THINGS: ARCHITECTURE, SECURITY GOALS, AND CHALLENGES- A SURVEY," International journal of innovative research in Sciense and Engineering , vol. 2, no. 4, pp. 154-163, 2016.
K.Krombholz, H.Hobel, M.Huber, & E. Weipp "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 2013.
J.Deogirikar, & A.Vidhate "Security Attacks inIoT: A Survey," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Palladam, India, 2017.
B.Yong, X.Liu, Q.Yu, L.Huang, & Q.Zhou "Malicious Web traffic detection for Internet of Things environments," Computers and Electrical Engineering, vol. 77, p. 260–272, 2019.
T.Nathezhtha, D.Sangeetha, V. Vaidehi "WC-PAD: Web Crawling based Phishing Attack Detection," in International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019.
S.A.Butt, & A.Ali, "IoT Smart Health Security Threats," in International Conference on Computational Science and Its Applications (ICCSA), Saint Petersburg, Russia, Russia, 2019.
F.Kausar, S.Alzaydi, S.Aljumah, & R.Alroba "Traffic Analysis Attack for Identifying Users’ Online Activities," IEEE IT Professional , vol. 21, no. 2, pp. 50-57, 2019.
"Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505 (2010). https://doi.org/10.1007/s10796-009-9210-z".
S.R.Taghanaki, K.Jamshidi, & A.Bohlooli "DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things," in IEEE, Mashhad, Iran, Iran, 2019.
N.Naher, Asaduzzaman, M.M Haque. "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC. In: Chakraborty M., Chakrabarti S., Balas V., Mandal J. (eds) Proceedings of International Ethical Hacking Conference Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore 2018.
C.Pu, "Spam DIS Attack Against Routing Protocol in the Internet of Things," in International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, USA, 2019.
Lo'ai A. Tawalbeh, T.F. Somani, "More secure Internet of Things using robust encryption algorithms against side channel attacks," in IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016.
A. Fox, "efficientgov," 21 May 2018. [Online]. Available: https://www.efficientgov.com/emergency-management/articles/cryptanalysis-attacks-protecting-government-data-encryption-gIzjjTqR78a0H0Cs/. [Accessed 5 May 2020].
N.NaherEmail, Md.Asaduzzaman, & Mokammel Haque "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC," in Proceedings of International Ethical Hacking Conference, Springer, Singapore, 2018.
R. Gour, "dzone," 30 Oct 2018. [Online]. Available: https://dzone.com/articles/top-10-uses-of-the-internet-of-things. [Accessed 5 May 2020].
T. Maddox, "techrepublic," 16 July 2018. [Online]. Available: https://www.techrepublic.com/article/smart-cities-the-smart-persons-guide/. [Accessed 5 May 2020].
G.Zhuo, Q.Jia, L.Guo, M.Li†, & Pan Li "Privacy-preserving Verifiable Data Aggregation and Analysis for Cloud-assisted Mobile Crowdsourcing," in The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 2016.
Zhang, J., Li, Q., Wang, X. et al. Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11, 778–792 (2018). https://doi.org/10.1007/s12083-017-0559-3
A.Alrawais, A.Alhothaily, C.Hu, X.Xingx, and X.Cheng, "An Attribute-Based Encryption Scheme to Secure Fog Communications," IEEE Access, vol. 5, pp. 9131 - 9138, May, 2017.
A.Alotaibi, A.Barnawi, M.Buhari, "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing," Journal of Information Security, vol. 8, pp. 203-222, 2017.
R.V. Kulkarni, G.K.Venayagamoorthy, "Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Networks," in Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14-19, 2009.
L.Xiao, C.Xie, T.Chen, H.Dai H. V.Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, vol. 4, pp. 2281 - 2291, 09 May 2016.
L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, `Proximity-based security techniques for mobile users in wireless networks,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.
G.Premsankar, M. Di Francesco, and T.Taleb, "Edge Computing for the Internet of Things: A Case Study," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1275 - 1284, April, 2018.
L. Rosencrance, " 6 significant issues that edge computing in IoT solves, 01 Nov 2018. [Online]. Available: https://internetofthingsagenda.techtarget.com/feature/6-significant-issues-that-edge-computing-in-IoT-solves?_ga=2.53786920.1250231981.1589957400-683346247.1588924221. [Accessed 20 May 2020].
N.Abbas, Y.Zhang, A.Taherkordi, and T.Skeie, "Mobile Edge Computing: A Survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450 - 465, 2018.
O. Novo, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," JOURNAL OF INTERNET OF THINGS CLASS FILES, vol. 14, no. 8, pp. 1-12, MARCH 2018.
P.LV, L.WANG, H.ZHU, W.DENG, and L.Gu, "An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains," IEEE Access , vol. 7, pp. 41309 - 41314, March 2019.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License