Skip to main content

Threats of Social Engineering Attacks Against Security of Internet of Things (IoT)

  • Conference paper
  • First Online:
Fundamental Research in Electrical Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 480))

Abstract

Internet of Things is a fast growing technology. Home appliances, clothes, traffic lights, cars, cameras, and more things used by human are prone to be connected to the IoT. Any new technology has its own challenges. Security is one of the greatest challenges of IoT. Security has been a challenge about the Internet, but in IoT domain, security is wider problem. For instance, manipulating the system of traffic lights will disrupt the security and public discipline. The daily life of human being is involved in the IoT, always and anytime is carried or controlled by users, therefore a vital role is going to be played in human interactions by IoT. Influencing the social interactions of individuals and their everyday lives can mean the penetration in the IoT and challenging the security. Social engineering is not a new concept; SE is an old category that is growing steadily with no end in its vision. SE is effective because human prefer to trust naturally. Social engineers target human factors and use the trust to thieve the purposed information. Generally, SE influences social interactions. Using SE against IoT and lack of knowledge among society will be able to cause a tragedy. SE is introduced in this paper and then security challenges of IoT will be discussed. People’s behaviors to keep their security will be discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chomsky N (2017) Noam Chomsky website, 17th March 2017. Retrieved from https://chomsky.info

  2. Hezar Jeribi J, Safari Shali R (2011) Social welfare and factors affecting it. J Res Plann 1–22

    Google Scholar 

  3. Kholod I, Petuhov I, Efimova M (2016) Data mining for the internet of things. Springer, St. Petersburg, Russia, 26–28 Sept 2016

    Google Scholar 

  4. Nejad Kamali M, Ali Abadi S, Kahani M (2017) Analyzing the Mirai Botnet based on IoT. In: 2nd conference on cyber space security incidents and vulnerabilities (CSIV 2017), Mashhad, Iran

    Google Scholar 

  5. Evans D (2011) The internet of things. how the next evolution of the internet is changing. Cisco White Paper, Cisco System

    Google Scholar 

  6. Gartner (2014) Gartner says the internet of things installed base will grow to 26 billion units by 2020

    Google Scholar 

  7. Krombholz K, Hobel H, Huber M, Weippl E (2015) Advanced social engineering attacks. J Inf Secur Appl 22:113–122 Elsevier

    Google Scholar 

  8. Mouton F, Leenen L, Venter H (2016) Social engineering attack examples. Comput Secur 59:186–209 Elsevier

    Article  Google Scholar 

  9. Ghasemi M, Saadaat M (2017) Toward introduction of Social engineering as a threats against the security of personal and professional information. In 2nd conference on cyberspace security incidents and vulnerabilities (CSIV 2017), Fersousi University, Mashhad, Iran

    Google Scholar 

  10. Maysh J (2017) Smithsonian, 9th March 2016. Retrieved from http://www.smithsonianmag.com/history/man-who-sold-eiffel-tower-twice-180958370/. Accessed on 24 Mar 2017

  11. Dien NK, Hieu TT, Thinh TN (2014) Memory-based multi-pattern signature scanning. In: First international conference on future data and security engineering, Ho Chi Minh City, Vietnam

    Google Scholar 

  12. Hadnagy C (2009) Social engineering. The art of human hacking. Wiley

    Google Scholar 

  13. PhishTank Retrieved from http://www.phishtank.com/what_is_phishing.php. Accessed on Mar 30 2017

  14. Ghasemi M, Saadaat M (2016) Social engineering. Naghoos Publication, Tehran

    Google Scholar 

  15. Aslani H 04 05 1391. Retrieved from http://www.urmialawyer.ir/articles/7755. Accessed on 1396 1 18

  16. Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2014) Security, privacy and trust in internet of things: the road ahead. Comput Netw

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen Ghasemi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghasemi, M., Saadaat, M., Ghollasi, O. (2019). Threats of Social Engineering Attacks Against Security of Internet of Things (IoT). In: Montaser Kouhsari, S. (eds) Fundamental Research in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 480. Springer, Singapore. https://doi.org/10.1007/978-981-10-8672-4_73

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8672-4_73

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8671-7

  • Online ISBN: 978-981-10-8672-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics