Abstract
The Internet of Things becomes a concept that will be used by everyone, anytime and everywhere in the upcoming years. Internet of Things will foster billion of devices, people and services to interconnect and exchange information and sensitive data. That’s why securing the communication through IoT is one of the greatest challenges faced by the scientist’s community today in their recent research’s. Therefore, it can be safely commercialized. This paper discusses the different security threats and vulnerabilities according to these three components: security threats on data and network, security threats on privacy and security threats on system and IoT through a review of the available literature. This study includes also a state of the art survey about the various physical attacks, network attacks and software ones. Finally, we will try to contribute by some recommendations and open research that should be done to improve the security of Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahamed, J., Rajan, A.V.: Internet of Things (IoT): Application Systems and Security Vulnerabilities (2016)
Ashton, K.L.: That Internet of Things Thing. Disponible sur: http://www.itrco.jp/libraries/RFIDjournal-That%20Inte net%20of%20Things%20Thing.pdf
Vermesan, O., Friess, P.: Internet of things: converging technologies for smart environments and integrated ecosystems. (2013)
Yan , L. (ed.): The internet of things: from RFID to the next-generation pervasive networked systems. New York: Auerbach Publ, (2008)
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. (2010)
Ishaq, I et al.: IETF Standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2(4) 235–287, (2013)
Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdfs
Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things (2015)
Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security Vulnerabilities and Challenges (2015)
Li, L.: Study on security architecture in the Internet of Things. In: 2012 International Conference on Measurement, Information and Control (MIC), vol. 1, pp. 374–377 (2012)
Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)
Khoo, B.: RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, pp. 709–712 (2011)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks, Gen. 15693, 14443 (2010)
Uttarkar, R., Kulkarni, R.: Internet of things: architecture and security. Int. J. Comput. Appl. 3, 12–19 (2014)
Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud Computing: Security Issues and Research Challenges. IEEE, Piscataway, NJ (2008)
Wu, D., Hu, G., Ni, G.: Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC 2008 .pp. 853–856 (2008)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing In Sensor Networks, pp. 259–268 (2004)
Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37 (2017)
Babar, S., Mahalle, P., Stango, A, Prasad, N., Prasad, R.: Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) (2010)
Open Web Application Security Project: Top 10 IoT Vulnerabilities Project (2014)
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Commun. ACM. 50(10), (2007)
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the ip-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)
Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Sahmi, I., Mazri, T., Hmina, N. (2019). Security Study of Different Threats in Internet of Things. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_64
Download citation
DOI: https://doi.org/10.1007/978-3-030-11196-0_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11195-3
Online ISBN: 978-3-030-11196-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)