A Survey on Security Attacks in Internet of Things and Challenges in Existing Countermeasures

  • Deepa KrishnanEmail author
  • Adesh Mallya
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 36)


Internet of Things (IoT) is one of the greatest technology revolutions that this millennium has witnessed. Its use became very widespread and it has entered into all realms of the lives of man. However, this major technological innovation is also affected by the risks of security attacks. This paper attempts to give a comprehensive review of all major security attacks faced by IoT industry. In addition to this, we have done a detailed analysis of the various countermeasures that exist today and have identified the major shortcomings of each approach. This could benefit the research community in opening up further research in IoT security.


Internet of things IoT Security Attack Countermeasures 


  1. 1.
    Liu A, Dong M, Ota K, Long J (2015) PHACK: an efficient scheme for selective forwarding attack detection in WSNs. J Sens 15(12):30942–30963CrossRefGoogle Scholar
  2. 2.
    Ren J, Zhang Y, Zhang K (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wireless Commun 15(5):3718–3731CrossRefGoogle Scholar
  3. 3.
    Zhu H, Zhang Z, Du J, Luo S, Xin Y (2018) Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. Int J Distrib Sens Netw 14(11)CrossRefGoogle Scholar
  4. 4.
    Shafiei H, Khonsari A, Derakhshi H, Mousavi P (2014) Detection and mitigation of sinkhole attacks in wireless sensor networks. J Comput Syst Sci 80:644–653CrossRefGoogle Scholar
  5. 5.
    Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: Proceedings of IFIP/IEEE international symposium on integrated management, pp 606–611Google Scholar
  6. 6.
    Khan WZ, Aalsalem MY, Saad MNBN, Xiang Y (2013) Detection and mitigation of node replication attacks in wireless sensor networks: a survey. Int J Distrib Sens Netw 9(5)CrossRefGoogle Scholar
  7. 7.
    Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, Kandemir MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans Syst Man Cybern C 37(6):1246–1258CrossRefGoogle Scholar
  8. 8.
    Choi H, Zhu S, Porta TFL (2007) SET: detecting node clones in sensor networks. In: Proceedings of the 3rd international conference on Security and Privacy in Communication Networks (SecureComm ’07), pp 341–350Google Scholar
  9. 9.
    Sindhuja LS, Padmavathi G (2016) Replica node detection using enhanced single hop detection with clonal selection algorithm in mobile wireless sensor networks. J Comput Netw Commun 2016, Article ID 1620343Google Scholar
  10. 10.
    Yu C-M, Tsou Y-T, Lu C-S, Kuo SY (2013) Localized algorithms for detection of node replication attacks in mobile sensor networks. IEEE Trans Inf Forensics Secur 8(5):754–768Google Scholar
  11. 11.
    Hancke GP, Mayes KE, Markantonakis K (2009) Confidence in smart token proximity: relay attacks revisited. J Comput Secur 28(7):615–627CrossRefGoogle Scholar
  12. 12.
    Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10–28CrossRefGoogle Scholar
  13. 13.
    Gubbia J, Buyya R, Marusica BS., Palaniswamia M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660CrossRefGoogle Scholar
  14. 14.
    Rajan A, Jithish J, Sankaran S (2017) Sybil attack in IoT: modelling and defences. In: Proceedings in International Conference of Advances in Computing, Communications and Informatics. (ICACCI), pp 2323–2327Google Scholar
  15. 15.
    Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based Internet of Things. Int J Distrib Sens Netw 9(8)CrossRefGoogle Scholar
  16. 16.
    Singh VP, Jain S, Singhai J (2010) Hello flood attack and its countermeasures in wireless sensor network. Int J Comput Sci 7(3)Google Scholar
  17. 17.
    Ren J, Zhang Y, Zhang K, Shen X (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE TransGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Engineering, Mukesh Patel School of Technology, Management and EngineeringNMIMS University (Deemed-to-be)MumbaiIndia

Personalised recommendations