Skip to main content

Need for Cybersecurity Solutions in IoT Systems

  • Conference paper
  • First Online:
Security-Related Advanced Technologies in Critical Infrastructure Protection

Abstract

People are living in the world where billions of IoT systems are connected to the Internet. They are sending and receiving data via network, and are controlled remotely. Many IoT systems do not have complex tasks to perform or to control. Because of that, they are built on cheap and weak hardware. Sometimes there are not enough resources to implement suitable, high-quality protection mechanism. The simplicity of the IoT system and its task lead the developer to leave the system unprotected. In this paper, the authors present how easy is to attack unprotected and protected systems. In three examples, they use free tools from Kali Linux to take control or disable systems. The know-how is also available through YouTube videos, thus any person with basic level of ICT skills can become a potential attacker or hacker. The goal of this article is to highlight the importance of protecting the IoT system, because by controlling even some simply process, the hackers can cause considerable damage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. What Are IoT Devices: https://www.simplilearn.com/iot-devices-article. Last accessed 21 Aug 2021

  2. Nyikes, Z., Kovács T. A., Tokody D.: In situ testing of rail damages in accordance with Industry 4.0. Journal of Physics-Conference Series (1742-6588 1742-6596) 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032

  3. Kaspersky: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security

  4. Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater. (1013-9826 1662-9795) 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286

  5. Kali: https://www.kali.org/docs/introduction/what-is-kali-linux/. Last accessed 10 Sept 2021

  6. Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Proc. Manuf. (2351-9789) 22, 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130

  7. Kali: https://www.kali.org/tools. Last accessed 10 Sept 2021

  8. Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Complex Syst. (1334-4684 1334-4676) 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9

  9. Kali Tools: https://tools.kali.org/information-gathering/arp-scan. Last accessed 10 Sept 2021

  10. Tcpdump: https://www.tcpdump.org/. Last accessed 10 Sept 2021

  11. Linux nc command.: https://www.computerhope.com/unix/nc.htm/. Last accessed 10 Sept 2021

  12. Null Byte.: https://www.youtube.com/watch?v=kXm8f9fhaxQ. Last accessed 11 Sept 2021

  13. Learn CCTV.: https://learncctv.com/how-to-hack-cctv-camera/. Last accessed 11 Sept 2021

  14. Nyikes, Z.: Creation proposal for the digital competency framework of the middle-east European region. Key Eng. Mater. (1013-9826 1662-9795) 755, 106–111 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.106

  15. Nyikes, Z.: Information security issues of RFID. In: Szakál, A. (ed.) SAMI 2016: IEEE 14th International Symposium on Applied Machine Intelligence and Informatics 2016, pp. 111–114. IEEE, New York (2016) ISBN: 9781467387392

    Google Scholar 

  16. Kismet.: https://www.kismetwireless.net/. Last accessed 10 Sept 2021

  17. Aireplay-ng | Penetration Testing Tools.: https://tools.kali.org/wireless-attacks/aireplay-ng. Last accessed 11 Aug 2021

  18. WEP: The “Wired Equivalent Privacy” Algorithm. https://www.ieee802.org/11/Documents/DocumentArchives/1994_docs/1194249_scan.pdf. Last accessed 31 Aug 2021

  19. Wi-Fi Alliance.: https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-announces-first-products-certified-for-wi-fi-protected-access. Last accessed 31 Aug 2021

  20. HaXF4Rall.: https://haxf4rall.com/2017/08/19/cracking-wpawpa2-psk-encryption. Last accessed 10 Sept 2021

  21. Aircrack-ng.: http://aircrack-ng.org/doku.php?id=airodump-ng. Last accessed 10 Sept 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Pinter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature B.V.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pinter, R., Čisar, S.M. (2022). Need for Cybersecurity Solutions in IoT Systems. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-94-024-2174-3_9

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-024-2173-6

  • Online ISBN: 978-94-024-2174-3

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics