Survey on IoT: Security Threats and Applications
Abstract
Keywords
Full Text:
PDFReferences
V.HASSIJA1, V.CHAMOLA, V.SAXENA, D.JAIN, P.GOYAL & B.SIKDAR, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE, vol. 7, pp. 82721 - 82743, 2019.
M.Stoyanova, Y.Nikoloudakis, S. Panagiotakis, E.Pallis, & E. K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues," IEEE, pp. 1-38, 2020.
D.Sopori, T.Pawar, M.Patil, & R.Ravindran "Internet of Things: Security Threats," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 3, pp. 263-267, 2017.
A.Jain, B.Sharma, & P.Gupta "INTERNET OF THINGS: ARCHITECTURE, SECURITY GOALS, AND CHALLENGES- A SURVEY," International journal of innovative research in Sciense and Engineering , vol. 2, no. 4, pp. 154-163, 2016.
K.Krombholz, H.Hobel, M.Huber, & E. Weipp "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 2013.
J.Deogirikar, & A.Vidhate "Security Attacks inIoT: A Survey," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Palladam, India, 2017.
B.Yong, X.Liu, Q.Yu, L.Huang, & Q.Zhou "Malicious Web traffic detection for Internet of Things environments," Computers and Electrical Engineering, vol. 77, p. 260–272, 2019.
T.Nathezhtha, D.Sangeetha, V. Vaidehi "WC-PAD: Web Crawling based Phishing Attack Detection," in International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019.
S.A.Butt, & A.Ali, "IoT Smart Health Security Threats," in International Conference on Computational Science and Its Applications (ICCSA), Saint Petersburg, Russia, Russia, 2019.
F.Kausar, S.Alzaydi, S.Aljumah, & R.Alroba "Traffic Analysis Attack for Identifying Users’ Online Activities," IEEE IT Professional , vol. 21, no. 2, pp. 50-57, 2019.
"Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505 (2010). https://doi.org/10.1007/s10796-009-9210-z".
S.R.Taghanaki, K.Jamshidi, & A.Bohlooli "DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things," in IEEE, Mashhad, Iran, Iran, 2019.
N.Naher, Asaduzzaman, M.M Haque. "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC. In: Chakraborty M., Chakrabarti S., Balas V., Mandal J. (eds) Proceedings of International Ethical Hacking Conference Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore 2018.
C.Pu, "Spam DIS Attack Against Routing Protocol in the Internet of Things," in International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, USA, 2019.
Lo'ai A. Tawalbeh, T.F. Somani, "More secure Internet of Things using robust encryption algorithms against side channel attacks," in IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016.
A. Fox, "efficientgov," 21 May 2018. [Online]. Available: https://www.efficientgov.com/emergency-management/articles/cryptanalysis-attacks-protecting-government-data-encryption-gIzjjTqR78a0H0Cs/. [Accessed 5 May 2020].
N.NaherEmail, Md.Asaduzzaman, & Mokammel Haque "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC," in Proceedings of International Ethical Hacking Conference, Springer, Singapore, 2018.
R. Gour, "dzone," 30 Oct 2018. [Online]. Available: https://dzone.com/articles/top-10-uses-of-the-internet-of-things. [Accessed 5 May 2020].
T. Maddox, "techrepublic," 16 July 2018. [Online]. Available: https://www.techrepublic.com/article/smart-cities-the-smart-persons-guide/. [Accessed 5 May 2020].
G.Zhuo, Q.Jia, L.Guo, M.Li†, & Pan Li "Privacy-preserving Verifiable Data Aggregation and Analysis for Cloud-assisted Mobile Crowdsourcing," in The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 2016.
Zhang, J., Li, Q., Wang, X. et al. Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11, 778–792 (2018). https://doi.org/10.1007/s12083-017-0559-3
A.Alrawais, A.Alhothaily, C.Hu, X.Xingx, and X.Cheng, "An Attribute-Based Encryption Scheme to Secure Fog Communications," IEEE Access, vol. 5, pp. 9131 - 9138, May, 2017.
A.Alotaibi, A.Barnawi, M.Buhari, "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing," Journal of Information Security, vol. 8, pp. 203-222, 2017.
R.V. Kulkarni, G.K.Venayagamoorthy, "Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Networks," in Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14-19, 2009.
L.Xiao, C.Xie, T.Chen, H.Dai H. V.Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, vol. 4, pp. 2281 - 2291, 09 May 2016.
L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, `Proximity-based security techniques for mobile users in wireless networks,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.
G.Premsankar, M. Di Francesco, and T.Taleb, "Edge Computing for the Internet of Things: A Case Study," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1275 - 1284, April, 2018.
L. Rosencrance, " 6 significant issues that edge computing in IoT solves, 01 Nov 2018. [Online]. Available: https://internetofthingsagenda.techtarget.com/feature/6-significant-issues-that-edge-computing-in-IoT-solves?_ga=2.53786920.1250231981.1589957400-683346247.1588924221. [Accessed 20 May 2020].
N.Abbas, Y.Zhang, A.Taherkordi, and T.Skeie, "Mobile Edge Computing: A Survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450 - 465, 2018.
O. Novo, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," JOURNAL OF INTERNET OF THINGS CLASS FILES, vol. 14, no. 8, pp. 1-12, MARCH 2018.
P.LV, L.WANG, H.ZHU, W.DENG, and L.Gu, "An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains," IEEE Access , vol. 7, pp. 41309 - 41314, March 2019.
DOI: https://doi.org/10.18196/jrc.2150
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Journal of Robotics and Control (JRC)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Journal of Robotics and Control (JRC)
P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com