Examining IoT in the Angle of Security with Counter measures – A Study

Authors

  • R. Parameswari Research Scholar, Rathinam College of Arts and Science, Rathinam TechZone Campus, Eachanari, Coimbatore, 641021, Tamil Nadu, India Author https://orcid.org/0009-0001-9633-726X
  • D. Raj Balaji Assistant Professor, Department of Computer Science, Rathinam College of Arts and Science, Rathinam TechZone Campus, Eachanari, Coimbatore, 641021, Tamil Nadu, India Author https://orcid.org/0000-0002-0696-7533

DOI:

https://doi.org/10.56294/sctconf2024.1117

Keywords:

IoT, challenges and opportunities, IoT attacks, Vulnerabilities, Detection methods

Abstract

Introduction: The collective networks of linked objects and technologies that enable communications between items and systems, including clouds, are referred to as Internet of Things (IoT). Recent decades of technological developments have paved the way for society to continue becoming more digitally integrated. 
Methods: IoT has turned into a massive network of smart gadgets that communicate online and grown into a new technological paradigm. The possibility that IoT may involve storing of sensitive data online, security is an essential component. Regrettably, the biggest obstacle to IoT technology adoption is security. Therefore, enhancing the security of IoT devices is currently the top concern for industries and academics. 
Results: A sizable corpus of research on the topic covers a number of problems and possible solutions. But the majority of current research falls short of providing a thorough analysis of assaults within IoT. 
Conclusion: The goal of this IoT investigation is to provide guiding information on dangers and assaults, followed by a thorough review of defense mechanisms against important IoT security attacks

References

1. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE communications surveys & tutorials. 17(4), PP. 2347-76. https://doi.org/10.1109/COMST.2015.2444095

2. Li S, Xu LD, Zhao S. The internet of things: a survey. Information systems frontiers. 17, PP. 243-59. https://doi.org/10.1007/s10796-014-9492-7

3. Farhan L, Kharel R, Kaiwartya O, Hammoudeh M, Adebisi B. Towards green computing for Internet of things: Energy oriented path and message scheduling approach. Sustainable Cities and Society. 38, PP. 195-204. https://doi.org/10.1016/j.scs.2017.12.018

4. Yaqoob I, Ahmed E, Hashem IA, Ahmed AI, Gani A, Imran M, Guizani M. Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE wireless communications. 24(3), PP. 10-6. https://doi.org/10.1109/MWC.2017.1600421

5. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D. Security of the Internet of Things: perspectives and challenges. Wireless networks. 20, PP. 2481-501. https://doi.org/10.1007/s11276-014-0761-7

6. Koshizuka N, Sakamura K. Ubiquitous ID: standards for ubiquitous computing and the internet of things. IEEE Pervasive Computing. 9(4), PP. 98-101. https://doi.org/10.1109/MPRV.2010.87

7. Want R. An introduction to RFID technology. IEEE pervasive computing. 5(1), PP. 25-33. https://doi.org/10.1109/MPRV.2006.2

8. McDermott-Wells P. Bluetooth scatternet models. IEEE potentials. 23(5), PP. 36-9. https://doi.org/10.1109/MP.2005.1368914

9. Ferro E, Potorti F. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wireless Communications. 12(1), PP. 12-26. https://doi.org/10.1109/MWC.2005.1404569

10. Want R. Near field communication. IEEE Pervasive Computing. 10(3), PP. 4-7. https://doi.org/10.1109/MPRV.2011.55

11. Crosby GV, Vafa F. Wireless sensor networks and LTE-A network convergence. In38th Annual IEEE conference on local computer networks, pp. 731-734. https://doi.org/10.1109/LCN.2013.6761322

12. Cao Q, Abdelzaher T, Stankovic J, He T. The liteos operating system: Towards unix-like abstractions for wireless sensor networks. In2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp. 233-244. https://doi.org/10.1109/IPSN.2008.54

13. Levis P, Madden S, Polastre J, Szewczyk R, Whitehouse K, Woo A, Gay D, Hill J, Welsh M, Brewer E, Culler D. TinyOS: An operating system for sensor networks. Ambient intelligence. PP. 115-48. https://doi.org/10.1007/3-540-27139-2_7

14. Gigli M, Koo S. Internet of Things, services and applications categorization. Advances in Internet of Things, 1, PP. 27-31.

15. Darwish D. Improved layered architecture for Internet of Things. Int. J. Comput. Acad. Res. (IJCAR). 4(4), PP. 214-23.

16. Sethi P, Sarangi SR. Internet of things: architectures, protocols, and applications. Journal of electrical and computer engineering. 2017(1), PP. 9324035. https://doi.org/10.1155/2017/9324035

17. Sengupta J, Ruj S, Bit SD. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of network and computer applications. 149, PP. 102481. https://doi.org/10.1016/j.jnca.2019.102481

18. Prabhakar S. Network security in digitalization: attacks and defence. Int. J. Res. Comput. Appl. Robot. 5(5), PP. 46-52.

19. R. Agar, IoT architecture guide: Major and additional layers of IoT system, November 2022, https://www.helpwire.app/blog/iot-architecture/.

20. Sanzgiri A, Dasgupta D. Classification of insider threat detection techniques. InProceedings of the 11th annual cyber and information security research conference, pp. 1-4. https://doi.org/10.1145/2897795.2897799

21. K. Gülen, IoT protocols 101: The essential guide to choosing the right option, January 2023, https://dataconomy.com/2023/01/03/iot-protocols-comparison/.

22. Akpakwu GA, Silva BJ, Hancke GP, Abu-Mahfouz AM. A survey on 5G networks for the Internet of Things: Communication technologies and challenges. IEEE access. 6, PP. 3619-47. https://doi.org/10.1109/ACCESS.2017.2779844

23. Sun L, Du Q. A review of physical layer security techniques for Internet of Things: Challenges and solutions. Entropy. 20(10), PP. 730. https://doi.org/10.3390/e20100730

24. Palattella MR, Accettura N, Vilajosana X, Watteyne T, Grieco LA, Boggia G, Dohler M. Standardized protocol stack for the internet of (important) things. IEEE communications surveys & tutorials. 15(3), PP. 1389-406. https://doi.org/10.1109/SURV.2012.111412.00158

25. Farhan L, Shukur ST, Alissa AE, Alrweg M, Raza U, Kharel R. A survey on the challenges and opportunities of the Internet of Things (IoT). In2017 Eleventh International Conference on Sensing Technology (ICST), pp. 1-5. https://doi.org/10.1109/ICSensT.2017.8304465

26. Bashir MR, Gill AQ. Towards an IoT big data analytics framework: smart buildings systems. In2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1325-1332. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0188

27. Lloret J, Tomas J, Canovas A, Parra L. An integrated IoT architecture for smart metering. IEEE Communications Magazine. 54(12), PP. 50-7. https://doi.org/10.1109/MCOM.2016.1600647CM

28. Farhan L, Alissa AE, Shukur ST, Hammoudeh M, Kharel R. An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks. In2017 Eleventh International Conference on Sensing Technology (ICST), pp. 1-6. https://doi.org/10.1109/ICSensT.2017.8304511

29. Krishna RR, Priyadarshini A, Jha AV, Appasani B, Srinivasulu A, Bizon N. State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions. Sustainability. 13(16), PP. 9463. https://doi.org/10.3390/su13169463

30. Ma W, Ma L, Li K, Guo J. Few-shot IoT attack detection based on SSDSAE and adaptive loss weighted meta residual network. Information Fusion. 98, PP. 101853. https://doi.org/10.1016/j.inffus.2023.101853

31. Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials. 21(3), PP. 2702-33. https://doi.org/10.1109/COMST.2019.2910750

32. A. Amir, What are IoT attacks?, 2023, https://www.educative.io/answers/what-are-iot-attacks

33. Common IoT attacks that compromise security, May 2022, https://socradar.io/common-iot-attacks-that-compromise-security/.

34. Victor P, Lashkari AH, Lu R, Sasi T, Xiong P, Iqbal S. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer-to-peer Networking and Applications. 16(3), PP. 1380-431. https://doi.org/10.1007/s12083-023-01478-w

35. IoT. Attacks, 6 security risks to be aware of, July 2023, https://www.byos.io/blog/iot-attacks.

36. Saha D, Yousuf MR, Matin MA. Energy efficient scheduling algorithm for S-MAC protocol in wireless sensor network. International Journal of Wireless & Mobile Networks. 3(6), PP. 129. https://doi.org/ 10.5121/ijwmn.2011.3610

37. Abdullah S, Yang K. An energy efficient message scheduling algorithm considering node failure in IoT environment. Wireless personal communications. 79, PP. 1815-35. https://doi.org/10.1007/s11277-014-1960-3

38. Wang Z, Liu Y, Sun Y, Li Y, Zhang D, Yang H. An energy-efficient heterogeneous dual-core processor for Internet of Things. In2015 IEEE international symposium on circuits and systems (ISCAS), pp. 2301-2304. https://doi.org/10.1109/ISCAS.2015.7169143

39. I. Bedhief, M. Kassar, and T. Aguili, “SDN-based architecture challeng-ing IoT heterogeneity,” in Proc. IEEE 3rd Smart Cloud Networks Systems (SCNS).

40. Sarkar C, SN AU, Prasad RV, Rahim A, Neisse R, Baldini G. DIAT: A scalable distributed architecture for IoT. IEEE Internet of Things journal. 2(3), PP. 230-9. https://doi.org/10.1109/JIOT.2014.2387155

41. Vejlgaard B, Lauridsen M, Nguyen H, Kovács IZ, Mogensen P, Sorensen M. Interference impact on coverage and capacity for low power wide area IoT networks. In2017 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6. https://doi.org/10.1109/WCNC.2017.7925510

42. Liu W, Huang K, Zhou X, Durrani S. Full-duplex backscatter interference networks based on time-hopping spread spectrum. IEEE Transactions on Wireless Communications. 16(7), PP. 4361-77. https://doi.org/10.1109/TWC.2017.2697864

43. Brogi A, Forti S. QoS-aware deployment of IoT applications through the fog. IEEE internet of Things Journal. 4(5), PP. 1185-92. https://doi.org/10.1109/JIOT.2017.2701408

44. Han S, Woo H. NDN-based Pub/Sub system for scalable IoT cloud. In2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 488-491. https://doi.org/10.1109/CloudCom.2016.0085

45. Bellavista P, Zanni A. Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. In2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI) pp. 1-6. https://doi.org/10.1109/RTSI.2016.7740614

46. Li S, Da Xu L, Zhao S. 5G Internet of Things: A survey. Journal of Industrial Information Integration. 10, PP. 1-9. https://doi.org/10.1016/j.jii.2018.01.005

47. Yassein MB, Aljawarneh S, Al-Sadi A. Challenges and features of IoT communications in 5G networks. In2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1-5. https://doi.org/10.1109/ICECTA.2017.8251989

48. R. Agar, IoT architecture guide: Major and additional layers of IoT system, November 2022, https://www.helpwire.app/blog/iot-architecture/

Downloads

Published

2024-08-29

How to Cite

1.
R. P, Raj Balaji D. Examining IoT in the Angle of Security with Counter measures – A Study. Salud, Ciencia y Tecnología - Serie de Conferencias [Internet]. 2024 Aug. 29 [cited 2025 Apr. 3];3:.1117. Available from: https://conferencias.ageditor.ar/index.php/sctconf/article/view/1117