Survey on IoT: Security Threats and Applications

Irfan Ahmad, Mohammad Saber Niazy, Riaz Ahmad Ziar, Sabawoon Khan

Abstract


the rapid growth of the internet of things (IoT) in the world in recent years is due to its wide range of usability, adaptability, and smartness. Most of the IoT applications are performing jobs an automatic manner without interactions of human or physical objects. It’s required that the current and upcoming devices will be smart, efficient and able to provide the services to the users to implement such a new technology with a secure manner. Thus the security issues are exploring day by day by the researchers. IoT devices are most portable and light in nature so it has several issues such as battery consumption, memory, and as these devices are working open range so the most important is security. In this survey paper, we have elaborated on the security attacks with reference to the different kinds of IoT layers. In the last, we have presented some of the applications of the IoT. This study will provide assistance to the researchers and manufacturers to evaluate and decrease the attacks range on IoT devices.

Keywords


IoT, smart Homes, healthcare, Encryption, Security

Full Text:

PDF

References


V.HASSIJA1, V.CHAMOLA, V.SAXENA, D.JAIN, P.GOYAL & B.SIKDAR, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," IEEE, vol. 7, pp. 82721 - 82743, 2019.

M.Stoyanova, Y.Nikoloudakis, S. Panagiotakis, E.Pallis, & E. K. Markakis, "A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues," IEEE, pp. 1-38, 2020.

D.Sopori, T.Pawar, M.Patil, & R.Ravindran "Internet of Things: Security Threats," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 6, no. 3, pp. 263-267, 2017.

A.Jain, B.Sharma, & P.Gupta "INTERNET OF THINGS: ARCHITECTURE, SECURITY GOALS, AND CHALLENGES- A SURVEY," International journal of innovative research in Sciense and Engineering , vol. 2, no. 4, pp. 154-163, 2016.

K.Krombholz, H.Hobel, M.Huber, & E. Weipp "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 2013.

J.Deogirikar, & A.Vidhate "Security Attacks inIoT: A Survey," in International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Palladam, India, 2017.

B.Yong, X.Liu, Q.Yu, L.Huang, & Q.Zhou "Malicious Web traffic detection for Internet of Things environments," Computers and Electrical Engineering, vol. 77, p. 260–272, 2019.

T.Nathezhtha, D.Sangeetha, V. Vaidehi "WC-PAD: Web Crawling based Phishing Attack Detection," in International Carnahan Conference on Security Technology (ICCST), CHENNAI, India, 2019.

S.A.Butt, & A.Ali, "IoT Smart Health Security Threats," in International Conference on Computational Science and Its Applications (ICCSA), Saint Petersburg, Russia, Russia, 2019.

F.Kausar, S.Alzaydi, S.Aljumah, & R.Alroba "Traffic Analysis Attack for Identifying Users’ Online Activities," IEEE IT Professional , vol. 21, no. 2, pp. 50-57, 2019.

"Mitrokotsa, A., Rieback, M.R. & Tanenbaum, A.S. Classifying RFID attacks and defenses. Inf Syst Front 12, 491–505 (2010). https://doi.org/10.1007/s10796-009-9210-z".

S.R.Taghanaki, K.Jamshidi, & A.Bohlooli "DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things," in IEEE, Mashhad, Iran, Iran, 2019.

N.Naher, Asaduzzaman, M.M Haque. "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC. In: Chakraborty M., Chakrabarti S., Balas V., Mandal J. (eds) Proceedings of International Ethical Hacking Conference Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore 2018.

C.Pu, "Spam DIS Attack Against Routing Protocol in the Internet of Things," in International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, USA, 2019.

Lo'ai A. Tawalbeh, T.F. Somani, "More secure Internet of Things using robust encryption algorithms against side channel attacks," in IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016.

A. Fox, "efficientgov," 21 May 2018. [Online]. Available: https://www.efficientgov.com/emergency-management/articles/cryptanalysis-attacks-protecting-government-data-encryption-gIzjjTqR78a0H0Cs/. [Accessed 5 May 2020].

N.NaherEmail, Md.Asaduzzaman, & Mokammel Haque "Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC," in Proceedings of International Ethical Hacking Conference, Springer, Singapore, 2018.

R. Gour, "dzone," 30 Oct 2018. [Online]. Available: https://dzone.com/articles/top-10-uses-of-the-internet-of-things. [Accessed 5 May 2020].

T. Maddox, "techrepublic," 16 July 2018. [Online]. Available: https://www.techrepublic.com/article/smart-cities-the-smart-persons-guide/. [Accessed 5 May 2020].

G.Zhuo, Q.Jia, L.Guo, M.Li†, & Pan Li "Privacy-preserving Verifiable Data Aggregation and Analysis for Cloud-assisted Mobile Crowdsourcing," in The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 2016.

Zhang, J., Li, Q., Wang, X. et al. Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11, 778–792 (2018). https://doi.org/10.1007/s12083-017-0559-3

A.Alrawais, A.Alhothaily, C.Hu, X.Xingx, and X.Cheng, "An Attribute-Based Encryption Scheme to Secure Fog Communications," IEEE Access, vol. 5, pp. 9131 - 9138, May, 2017.

A.Alotaibi, A.Barnawi, M.Buhari, "Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing," Journal of Information Security, vol. 8, pp. 203-222, 2017.

R.V. Kulkarni, G.K.Venayagamoorthy, "Neural Network Based Secure Media Access Control Protocol for Wireless Sensor Networks," in Proceedings of International Joint Conference on Neural Networks, Atlanta, Georgia, USA, June 14-19, 2009.

L.Xiao, C.Xie, T.Chen, H.Dai H. V.Poor, "A Mobile Offloading Game Against Smart Attacks," IEEE Access, vol. 4, pp. 2281 - 2291, 09 May 2016.

L. Xiao, Q. Yan, W. Lou, G. Chen, and Y. T. Hou, `Proximity-based security techniques for mobile users in wireless networks,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2089-2100, Dec. 2013.

G.Premsankar, M. Di Francesco, and T.Taleb, "Edge Computing for the Internet of Things: A Case Study," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1275 - 1284, April, 2018.

L. Rosencrance, " 6 significant issues that edge computing in IoT solves, 01 Nov 2018. [Online]. Available: https://internetofthingsagenda.techtarget.com/feature/6-significant-issues-that-edge-computing-in-IoT-solves?_ga=2.53786920.1250231981.1589957400-683346247.1588924221. [Accessed 20 May 2020].

N.Abbas, Y.Zhang, A.Taherkordi, and T.Skeie, "Mobile Edge Computing: A Survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450 - 465, 2018.

O. Novo, "Blockchain Meets IoT: an Architecture for Scalable Access Management in IoT," JOURNAL OF INTERNET OF THINGS CLASS FILES, vol. 14, no. 8, pp. 1-12, MARCH 2018.

P.LV, L.WANG, H.ZHU, W.DENG, and L.Gu, "An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains," IEEE Access , vol. 7, pp. 41309 - 41314, March 2019.




DOI: https://doi.org/10.18196/jrc.2150

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Journal of Robotics and Control (JRC)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


Journal of Robotics and Control (JRC)

P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com


Kuliah Teknik Elektro Terbaik