Security Study of Different Threats in Internet of Things
Abstract
The Internet of Things becomes a concept that will be used by everyone, anytime and everywhere in the upcoming years. Internet of Things will foster billion of devices, people and services to interconnect and exchange information and sensitive data. That’s why securing the communication through IoT is one of the greatest challenges faced by the scientist’s community today in their recent research’s. Therefore, it can be safely commercialized. This paper discusses the different security threats and vulnerabilities according to these three components: security threats on data and network, security threats on privacy and security threats on system and IoT through a review of the available literature. This study includes also a state of the art survey about the various physical attacks, network attacks and software ones. Finally, we will try to contribute by some recommendations and open research that should be done to improve the security of Internet of Things.
Keywords
Security Internet of things ThreatsReferences
- 1.Ahamed, J., Rajan, A.V.: Internet of Things (IoT): Application Systems and Security Vulnerabilities (2016)Google Scholar
- 2.Ashton, K.L.: That Internet of Things Thing. Disponible sur: http://www.itrco.jp/libraries/RFIDjournal-That%20Inte net%20of%20Things%20Thing.pdf
- 3.Vermesan, O., Friess, P.: Internet of things: converging technologies for smart environments and integrated ecosystems. (2013)Google Scholar
- 4.Yan , L. (ed.): The internet of things: from RFID to the next-generation pervasive networked systems. New York: Auerbach Publ, (2008)Google Scholar
- 5.Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. (2010)Google Scholar
- 6.Ishaq, I et al.: IETF Standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2(4) 235–287, (2013)CrossRefGoogle Scholar
- 7.Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdfsGoogle Scholar
- 8.Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things (2015)Google Scholar
- 9.Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security Vulnerabilities and Challenges (2015)Google Scholar
- 10.Li, L.: Study on security architecture in the Internet of Things. In: 2012 International Conference on Measurement, Information and Control (MIC), vol. 1, pp. 374–377 (2012)Google Scholar
- 11.Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)CrossRefGoogle Scholar
- 12.Khoo, B.: RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, pp. 709–712 (2011)Google Scholar
- 13.Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks, Gen. 15693, 14443 (2010)Google Scholar
- 14.Uttarkar, R., Kulkarni, R.: Internet of things: architecture and security. Int. J. Comput. Appl. 3, 12–19 (2014)Google Scholar
- 15.Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud Computing: Security Issues and Research Challenges. IEEE, Piscataway, NJ (2008)Google Scholar
- 16.Wu, D., Hu, G., Ni, G.: Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC 2008 .pp. 853–856 (2008)Google Scholar
- 17.Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing In Sensor Networks, pp. 259–268 (2004)Google Scholar
- 18.Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37 (2017)Google Scholar
- 19.Babar, S., Mahalle, P., Stango, A, Prasad, N., Prasad, R.: Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) (2010)Google Scholar
- 20.Open Web Application Security Project: Top 10 IoT Vulnerabilities Project (2014)Google Scholar
- 21.Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Commun. ACM. 50(10), (2007)CrossRefGoogle Scholar
- 22.Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the ip-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)CrossRefGoogle Scholar
- 23.Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017)Google Scholar