Skip to main content

Taxonomy of Security Attacks on Internet of Things

  • Chapter
  • First Online:
Security and Privacy in Cyberspace

Part of the book series: Blockchain Technologies ((BT))

Abstract

Internet of Things (IoT) are an extensive smart device networked ecosystem, which routinely exchange log data and information over the Internet with portals and humans. Given the considerable expansion and acceptance of IoT as enabling technology paradigm, in recent years, IoT devices face critical safety issues and threats to online data security. This chapter reviews and examines the security of the devices networked in smart intelligent homes, health care, and transport domains. Improper or unauthorized access of the IoT devices causes availability issues leading to widespread risks and downtimes. The authors present security attack-related taxonomy for the IoT devices, the focus is to assist IoT device designers and developers to better understand the risks and threats of security failures and help to integrate stronger safeguards in the IoT devices. A use-case scenario is also discussed related to design and implementation of a smart, secure vehicular traffic control using IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. EY (2015) Cybersecurity and the Internet of Things. EY Global, UK

    Google Scholar 

  2. Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of things. arXiv preprint arXiv: 1501.02211

    Google Scholar 

  3. Zhou H (2012) The Internet of Things in the cloud in a middleware perspective. CRC Press

    Google Scholar 

  4. Li S, Da Xu L, Zhao S (2014) The Internet of Things: a survey. In: Springer information systems frontiers, New York, pp. 243–299. https://doi.org/10.1007/s10796-014-9492-7

  5. Mahmud Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges and open problems in the Internet of Things. In: 2015 IEEE world congress on services (SERVICES). IEEE, pp 21–28

    Google Scholar 

  6. Singh S, Singh N (2015) Internet of Things (IoT): security challenges, business opportunities & reference architecture for e-commerce. In: 2015 international conference on Green Computing and Internet of Things (GCIoT). IEEE, pp 1577–1581

    Google Scholar 

  7. Gou Q, Yan L, Liu Y, Li Y (2013) Construction and strategies in IoT security system. In: Green computing and communications (GreenCom). In: 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing. IEEE, pp 1129–1132

    Google Scholar 

  8. Wang Y, Zhang X (2011) Internet of Things. Springer International IoT Workshop, Changsha, China

    Google Scholar 

  9. Harun Yilmaz M, Arslan H (2015) A survey: spoofing attacks in physical layer security. In: 40th annual IEEE conference on local computer networks. IEEE, pp 812–817

    Google Scholar 

  10. Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the Internet of Things. IEEE Internet Things J 1(5):372–383

    Article  Google Scholar 

  11. Alsaadi E, Tubaishat A (2015) Internet of Things: features, challenges, vol 4, no 1, pp 1–13

    Google Scholar 

  12. Belapurkar A (2009) Distributed systems security: issues, processes, and solutions. John Wiley & Sons, Chichester, UK

    Book  Google Scholar 

  13. Alam S, De D (2014) Analysis of security threats in wireless sensor network, vol 6, no 2, pp 35–46

    Google Scholar 

  14. Grand I, Nancy E, Nancy T (2016) A taxonomy of attacks in RPL-based Internet of Things, vol 18, no 3, pp 459–473

    Google Scholar 

  15. Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks: countermeasures and security management schemes, vol 64, no 16, pp 19–28

    Google Scholar 

  16. Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  17. Nandal D, Nandal V (2011) Security threats in wireless sensor networks, vol 11, no 01, pp 59–63

    Google Scholar 

  18. Billure R, Tayur VM, Mahesh V (2015) A study on the security challenges, pp 247–252

    Google Scholar 

  19. Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: 2013 IEEE international conference on distributed computing in sensor systems (DCOSS). IEEE, pp 351–355

    Google Scholar 

  20. Press G (2013) Internet of Things (IoT) predictions|what’s The Big Data? on WordPress.com. http://whatsthebigdata.com/2016/02/13/internet-of-things-iot-predictions/. Accessed 23 Feb 2016

  21. InfoSec I (2015) Insider vs outsider threats: identify and prevent. http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-and-prevent/. Accessed 13 June 2016

  22. Bhardwaj A, Goundar S (2019) IoT enabled smart fog computing for vehicular traffic control IOT. EAI https://doi.org/10.4108/eai.31-10-2018.162221

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keshav Kaushik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bhardwaj, A., Kaushik, K., Kumar, M. (2022). Taxonomy of Security Attacks on Internet of Things. In: Kaiwartya, O., Kaushik, K., Gupta, S.K., Mishra, A., Kumar, M. (eds) Security and Privacy in Cyberspace. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-19-1960-2_1

Download citation

Publish with us

Policies and ethics