Skip to main content

Security Study of Different Threats in Internet of Things

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 2 (SCA 2018)

Abstract

The Internet of Things becomes a concept that will be used by everyone, anytime and everywhere in the upcoming years. Internet of Things will foster billion of devices, people and services to interconnect and exchange information and sensitive data. That’s why securing the communication through IoT is one of the greatest challenges faced by the scientist’s community today in their recent research’s. Therefore, it can be safely commercialized. This paper discusses the different security threats and vulnerabilities according to these three components: security threats on data and network, security threats on privacy and security threats on system and IoT through a review of the available literature. This study includes also a state of the art survey about the various physical attacks, network attacks and software ones. Finally, we will try to contribute by some recommendations and open research that should be done to improve the security of Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahamed, J., Rajan, A.V.: Internet of Things (IoT): Application Systems and Security Vulnerabilities (2016)

    Google Scholar 

  2. Ashton, K.L.: That Internet of Things Thing. Disponible sur: http://www.itrco.jp/libraries/RFIDjournal-That%20Inte net%20of%20Things%20Thing.pdf

  3. Vermesan, O., Friess, P.: Internet of things: converging technologies for smart environments and integrated ecosystems. (2013)

    Google Scholar 

  4. Yan , L. (ed.): The internet of things: from RFID to the next-generation pervasive networked systems. New York: Auerbach Publ, (2008)

    Google Scholar 

  5. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. (2010)

    Google Scholar 

  6. Ishaq, I et al.:  IETF Standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2(4) 235–287, (2013)

    Article  Google Scholar 

  7. Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdfs

    Google Scholar 

  8. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things (2015)

    Google Scholar 

  9. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security Vulnerabilities and Challenges (2015)

    Google Scholar 

  10. Li, L.: Study on security architecture in the Internet of Things. In: 2012 International Conference on Measurement, Information and Control (MIC), vol. 1, pp. 374–377 (2012)

    Google Scholar 

  11. Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)

    Article  Google Scholar 

  12. Khoo, B.: RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, pp. 709–712 (2011)

    Google Scholar 

  13. Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks, Gen. 15693, 14443 (2010)

    Google Scholar 

  14. Uttarkar, R., Kulkarni, R.: Internet of things: architecture and security. Int. J. Comput. Appl. 3, 12–19 (2014)

    Google Scholar 

  15. Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud Computing: Security Issues and Research Challenges. IEEE, Piscataway, NJ (2008)

    Google Scholar 

  16. Wu, D., Hu, G., Ni, G.: Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC 2008 .pp. 853–856 (2008)

    Google Scholar 

  17. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing In Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  18. Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37 (2017)

    Google Scholar 

  19. Babar, S., Mahalle, P., Stango, A, Prasad, N., Prasad, R.: Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) (2010)

    Google Scholar 

  20. Open Web Application Security Project: Top 10 IoT Vulnerabilities Project (2014)

    Google Scholar 

  21. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Commun. ACM. 50(10), (2007)

    Article  Google Scholar 

  22. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the ip-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)

    Article  Google Scholar 

  23. Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imane Sahmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sahmi, I., Mazri, T., Hmina, N. (2019). Security Study of Different Threats in Internet of Things. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_64

Download citation

Publish with us

Policies and ethics