Skip to main content

Emerging Security Issues in IoT

  • Conference paper
  • First Online:
Emerging Technologies for Computing, Communication and Smart Cities

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 875))

Abstract

The Internet of Things (IoT) is an innovative model that combines the physical world with the Internet and turns out to be one of the major hi-tech breakthroughs of computer technology. The low openness and absence of interoperability of a significant number of these gadgets in an enormous region of magnitude will make it extremely hard to plan explicit wellbeing techniques and actualize a particular security strategy for sustainable IoT. Moreover, IoT networks presented are helpless against assaults planned to disturb the organization. Thus, special measures are required to combat the upward security apprehensions in IoT. In this article, these security concerns with respect to different layers of basic architecture of IoT are studied in detail; with other emerging challenges, IoT is facing today.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT : internet of threats ? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 1. https://doi.org/10.1109/JIOT.2019.2935189

  2. Bhuvaneswari V, Porkodi R (2014) The internet of things (IOT) applications and communication enabling technology standards: an overview. In: Proceedings—2014 International conference on intelligent computing applications ICICA, pp 324–329. https://doi.org/10.1109/ICICA.2014.73

  3. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of IoT-enabled cyberattacks : assessing attack paths to critical infrastructures and services. IEEE Commun Surv Tutorials 1. https://doi.org/10.1109/COMST.2018.2855563

  4. Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2018) Anatomy of threats to the internet of things. IEEE Commun Surv Tutorials 1. https://doi.org/10.1109/COMST.2018.2874978

  5. Liu L, Xu B, Zhang X, Wu X (2018) An intrusion detection method for internet of things based on suppressed fuzzy clustering. Eurasip J Wirel Commun Netw 1:2018. https://doi.org/10.1186/s13638-018-1128-z

    Article  Google Scholar 

  6. Anand P, Singh Y, Selwal A, Singh PK, Felseghi RA, Raboaca MS (2020) IoVT: internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids. Energies 13(18):1–23. https://doi.org/10.3390/en13184813

    Article  Google Scholar 

  7. Hameed A (2019) Security issues in IoT : a survey. In: International conference on innovation and intelligence informatics, computing, and technologies, pp 1–5

    Google Scholar 

  8. Mrabet H, Belguith S, Alhomoud A, Jemai A (2020) A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors (Switzerland) 20(13):1–20. https://doi.org/10.3390/s20133625

    Article  Google Scholar 

  9. Sarkar C et al (2014) DIAT : a scalable distributed architecture for IoT. X(X):1–10. https://doi.org/10.1109/JIOT.2014.2387155

  10. Li D, Deng L, Lee M, Wang H (2019) IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int J Inf Manage 49(April):533–545. https://doi.org/10.1016/j.ijinfomgt.2019.04.006

    Article  Google Scholar 

  11. Dawoud A, Shahristani S, Raun C (2018) Deep learning and software-defined networks: towards secure IoT architecture. Internet of Things 3–4:82–89. https://doi.org/10.1016/j.iot.2018.09.003

    Article  Google Scholar 

  12. Lv W, Meng F, Zhang C, Lv Y, Cao N, Jiang J (2017) A general architecture of IoT system. 659–664. https://doi.org/10.1109/CSE-EUC.2017.124

  13. Mathew PS, Pillai AS, Palade V (2018) Applications of IoT in healthcare

    Google Scholar 

  14. Chaudhary S (2019) CRAIoT : concept, review and application (s) of IoT. In: 2019 4th International conference on internet things smart innovation and usages, pp 1–4

    Google Scholar 

  15. Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: Proceedings of the international conference on IoT social mobile, analytics and cloud, I-SMAC, pp 32–37. https://doi.org/10.1109/I-SMAC.2017.8058363

  16. Anand P, Singh Y, Selwal A, Alazab M, Member S, Tanwar S (2020) IoT vulnerability assessment for sustainable computing : threats, current solutions, and open challenges. 168825–168853. https://doi.org/10.1109/ACCESS.2020.3022842

  17. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045

    Article  Google Scholar 

  18. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security : challenges and solutions. Appl Sci 1–17

    Google Scholar 

  19. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things : security vulnerabilities and challenges. pp 180–187

    Google Scholar 

  20. Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world : present and future challenges. 4662. https://doi.org/10.1109/JIOT.2017.2767291

  21. Mukherjee BA (2015) Physical-layer security in the internet of things : sensing and communication confidentiality under resource constraints. 103(10)

    Google Scholar 

  22. Galeano-Brajones J, Carmona-Murillo J, Valenzuela-Valdés JF, Luna-Valero F (2020) Detection and mitigation of DoS and DDoS attacks in iot-based stateful SDN: an experimental approach. Sensors (Switzerland) 20(3). https://doi.org/10.3390/s20030816

  23. Sharma V, You I, Andersson K, Palmieri F, Rehmani MH, Lim J (2020) Security, privacy and trust for smart mobile-internet of things (M-IoT): a survey. https://doi.org/10.1109/ACCESS.2020.3022661

  24. Yugha R, Chithra S (2020) A survey on technologies and security protocols: reference for future generation IoT. J Netw Comput Appl 169:102763. https://doi.org/10.1016/j.jnca.2020.102763

    Article  Google Scholar 

  25. Tournier J, Lesueur F, Le Mouël F, Guyon L, Ben-Hassine H (2020) A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things 100264. https://doi.org/10.1016/j.iot.2020.100264

  26. Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2017) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20. https://doi.org/10.1109/JIOT.2016.2615180

    Article  Google Scholar 

  27. Ibitoye O, Shafiq O, Matrawy A (2019) Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. arXiv

    Google Scholar 

  28. Pal S, Hitchens M, Rabehaja T, Mukhopadhyay S (2020) Security requirements for the internet of things: a systematic approach. Sensors (Switzerland) 20(20):1–34. https://doi.org/10.3390/s20205897

    Article  Google Scholar 

  29. Nebbione G, Calzarossa MC (2020) Security of IoT application layer protocols : challenges and findings. 1–20. https://doi.org/10.3390/fi12030055

  30. Obaidat MA, Obeidat S, Holst J, Al Hayajneh A, Brown J (2020) A comprehensive and systematic survey on the internet of things: security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers 9(2). https://doi.org/10.3390/computers9020044

  31. Benkhelifa E, Welsh T, Hamouda W (2018) A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv Tutorials 20(4):3496–3509. https://doi.org/10.1109/COMST.2018.2844742

    Article  Google Scholar 

  32. Chen S et al (2020) A vision of IoT : applications, challenges, and opportunities with China perspective. 1(4):349–359

    Google Scholar 

  33. Challenges S (2021) Internet of things: evolution, concerns and security challenges

    Google Scholar 

  34. Farhan L, Alissa AE (2017) A survey on the challenges and opportunities of the internet of things (IoT)

    Google Scholar 

  35. Sengupta J, Ruj S, Das Bit S (2019) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 102481. https://doi.org/10.1016/j.jnca.2019.102481

  36. Panchiwala S, Shah M (2020) A comprehensive study on critical security issues and challenges of the IoT world

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahad, U., Singh, Y., Anand, P. (2022). Emerging Security Issues in IoT. In: Singh, P.K., Kolekar, M.H., Tanwar, S., Wierzchoń, S.T., Bhatnagar, R.K. (eds) Emerging Technologies for Computing, Communication and Smart Cities. Lecture Notes in Electrical Engineering, vol 875. Springer, Singapore. https://doi.org/10.1007/978-981-19-0284-0_55

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0284-0_55

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0283-3

  • Online ISBN: 978-981-19-0284-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics