Abstract
Internet of Things (IoT) are an extensive smart device networked ecosystem, which routinely exchange log data and information over the Internet with portals and humans. Given the considerable expansion and acceptance of IoT as enabling technology paradigm, in recent years, IoT devices face critical safety issues and threats to online data security. This chapter reviews and examines the security of the devices networked in smart intelligent homes, health care, and transport domains. Improper or unauthorized access of the IoT devices causes availability issues leading to widespread risks and downtimes. The authors present security attack-related taxonomy for the IoT devices, the focus is to assist IoT device designers and developers to better understand the risks and threats of security failures and help to integrate stronger safeguards in the IoT devices. A use-case scenario is also discussed related to design and implementation of a smart, secure vehicular traffic control using IoT devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
EY (2015) Cybersecurity and the Internet of Things. EY Global, UK
Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of things. arXiv preprint arXiv: 1501.02211
Zhou H (2012) The Internet of Things in the cloud in a middleware perspective. CRC Press
Li S, Da Xu L, Zhao S (2014) The Internet of Things: a survey. In: Springer information systems frontiers, New York, pp. 243–299. https://doi.org/10.1007/s10796-014-9492-7
Mahmud Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges and open problems in the Internet of Things. In: 2015 IEEE world congress on services (SERVICES). IEEE, pp 21–28
Singh S, Singh N (2015) Internet of Things (IoT): security challenges, business opportunities & reference architecture for e-commerce. In: 2015 international conference on Green Computing and Internet of Things (GCIoT). IEEE, pp 1577–1581
Gou Q, Yan L, Liu Y, Li Y (2013) Construction and strategies in IoT security system. In: Green computing and communications (GreenCom). In: 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing. IEEE, pp 1129–1132
Wang Y, Zhang X (2011) Internet of Things. Springer International IoT Workshop, Changsha, China
Harun Yilmaz M, Arslan H (2015) A survey: spoofing attacks in physical layer security. In: 40th annual IEEE conference on local computer networks. IEEE, pp 812–817
Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the Internet of Things. IEEE Internet Things J 1(5):372–383
Alsaadi E, Tubaishat A (2015) Internet of Things: features, challenges, vol 4, no 1, pp 1–13
Belapurkar A (2009) Distributed systems security: issues, processes, and solutions. John Wiley & Sons, Chichester, UK
Alam S, De D (2014) Analysis of security threats in wireless sensor network, vol 6, no 2, pp 35–46
Grand I, Nancy E, Nancy T (2016) A taxonomy of attacks in RPL-based Internet of Things, vol 18, no 3, pp 459–473
Sabeel U, Chandra N (2013) Categorized security threats in the wireless sensor networks: countermeasures and security management schemes, vol 64, no 16, pp 19–28
Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787–2805
Nandal D, Nandal V (2011) Security threats in wireless sensor networks, vol 11, no 01, pp 59–63
Billure R, Tayur VM, Mahesh V (2015) A study on the security challenges, pp 247–252
Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: 2013 IEEE international conference on distributed computing in sensor systems (DCOSS). IEEE, pp 351–355
Press G (2013) Internet of Things (IoT) predictions|what’s The Big Data? on WordPress.com. http://whatsthebigdata.com/2016/02/13/internet-of-things-iot-predictions/. Accessed 23 Feb 2016
InfoSec I (2015) Insider vs outsider threats: identify and prevent. http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-and-prevent/. Accessed 13 June 2016
Bhardwaj A, Goundar S (2019) IoT enabled smart fog computing for vehicular traffic control IOT. EAI https://doi.org/10.4108/eai.31-10-2018.162221
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Bhardwaj, A., Kaushik, K., Kumar, M. (2022). Taxonomy of Security Attacks on Internet of Things. In: Kaiwartya, O., Kaushik, K., Gupta, S.K., Mishra, A., Kumar, M. (eds) Security and Privacy in Cyberspace. Blockchain Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-19-1960-2_1
Download citation
DOI: https://doi.org/10.1007/978-981-19-1960-2_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1959-6
Online ISBN: 978-981-19-1960-2
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)