Skip to main content

2021 | OriginalPaper | Buchkapitel

Security Threats and Their Mitigations in IoT Devices

verfasst von : Saurabh Gupta, N. Lingareddy

Erschienen in: Techno-Societal 2020

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of things (IoT) is another worldview converging with the social networks, permitting data sharing between the individuals and electronic gadgets. Likewise, it is expected for omnipresent connectivity among different entities or things using Internet. Anyway, security and privacy issues are the major concerns for IoT. The heterogeneous technological advancements, inherent vulnerabilities of IoT devices, poor design IoT standard invites the cyber attack. This research work mainly aims to address the security threats and issues on different layers of IoT architectures and their possible mitigations. Also, it provides a taxonomic representation of the major 3-layers of IoT architecture with their protocol stack. Finally, we have highlighted the most challenging security threats and their mitigations with some future research work proposals.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Van Der Meulen R (2015) Gartner says 6.4 billion connected ‘things’ will be in use in 2016, up 30 percent from 2015. Stamford Van Der Meulen R (2015) Gartner says 6.4 billion connected ‘things’ will be in use in 2016, up 30 percent from 2015. Stamford
2.
Zurück zum Zitat Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D (2015) Unlocking the potential of the internet of things. McKinsey Global Institute Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D (2015) Unlocking the potential of the internet of things. McKinsey Global Institute
3.
Zurück zum Zitat Lamba A, Singh S, Singh B, Sai S, Muni R, Islands C (2018) Quantum computing technology (QCT)—a data security threat. Int J Emerg Technol Innov Res 5(4): 801–806 Lamba A, Singh S, Singh B, Sai S, Muni R, Islands C (2018) Quantum computing technology (QCT)—a data security threat. Int J Emerg Technol Innov Res 5(4): 801–806
4.
Zurück zum Zitat Ning H (2013) Unit and ubiquitous internet of things. CRC Press, Inc., Boca Raton Ning H (2013) Unit and ubiquitous internet of things. CRC Press, Inc., Boca Raton
5.
Zurück zum Zitat Sarangi M, Singh D, Khuntia M (2019) A potential solution for man-in-middle security issues through near field communication (NFC). Int J Eng Adv Technol (IJEAT) 8(4):492–498 Sarangi M, Singh D, Khuntia M (2019) A potential solution for man-in-middle security issues through near field communication (NFC). Int J Eng Adv Technol (IJEAT) 8(4):492–498
6.
Zurück zum Zitat Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17:2347–2376 Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17:2347–2376
7.
Zurück zum Zitat Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th international conference on frontiers of information technology, Islamabad, 17–19 Dec 2012, pp 257–260 Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th international conference on frontiers of information technology, Islamabad, 17–19 Dec 2012, pp 257–260
8.
Zurück zum Zitat Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) J Internet Serv Appl 4(5) Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) J Internet Serv Appl 4(5)
9.
Zurück zum Zitat Ochani A, Dongre N (2017) Security issues in cloud computing. In: International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC) Ochani A, Dongre N (2017) Security issues in cloud computing. In: International conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC)
10.
Zurück zum Zitat Tianfield H (2012) Security issues in cloud computing. In: IEEE international conference on systems, man, and cybernetics Tianfield H (2012) Security issues in cloud computing. In: IEEE international conference on systems, man, and cybernetics
11.
Zurück zum Zitat Sammy F, Vigila S (2016) A survey on CIA triad for cloud storage services, vol 9, pp 6701–6709 Sammy F, Vigila S (2016) A survey on CIA triad for cloud storage services, vol 9, pp 6701–6709
12.
Zurück zum Zitat Paruchuri VL (2016) Data confidentiality in cloud using encryption algorithms. Int J Cloud Comput Super Comput 3(2):7–18 Paruchuri VL (2016) Data confidentiality in cloud using encryption algorithms. Int J Cloud Comput Super Comput 3(2):7–18
13.
Zurück zum Zitat Lamba A (2019) SR-MLC: machine learning classifiers in cyber security—an optimal approach. Int J Res Inf Sci Appl Tech (IJRISAT) I(3) Lamba A (2019) SR-MLC: machine learning classifiers in cyber security—an optimal approach. Int J Res Inf Sci Appl Tech (IJRISAT) I(3)
14.
Zurück zum Zitat Chandrika Sai Priya A (2016) Integrated framework for multi-user encrypted query operations on cloud database services. Int J Cloud Comput Super Comput 3(2):1–6 Chandrika Sai Priya A (2016) Integrated framework for multi-user encrypted query operations on cloud database services. Int J Cloud Comput Super Comput 3(2):1–6
15.
Zurück zum Zitat Aich A, Sen A (2015) Study on cloud security risk and remedy. Int J Grid Distrib Comput 8(2) Aich A, Sen A (2015) Study on cloud security risk and remedy. Int J Grid Distrib Comput 8(2)
16.
Zurück zum Zitat Bhattacharyya D (2018) Space and security issues in cloud computing: a review. Int J Secur Appl 12(6):37–46 Bhattacharyya D (2018) Space and security issues in cloud computing: a review. Int J Secur Appl 12(6):37–46
17.
Zurück zum Zitat Thirupathi Rao N, Sravani A, Bhattacharyya D, Kim T (2018) Security and assurance aspects to be observed in cloud computing based data centers: a study. Int J Secur Appl 12(4):1–14 Thirupathi Rao N, Sravani A, Bhattacharyya D, Kim T (2018) Security and assurance aspects to be observed in cloud computing based data centers: a study. Int J Secur Appl 12(4):1–14
18.
Zurück zum Zitat Thirupathi Rao N, Bhattacharyya D (2019) Security aspects to be considered in cloud computing based data centers: a tutorial. Int J Database Theory Appl 12(1):27–42 Thirupathi Rao N, Bhattacharyya D (2019) Security aspects to be considered in cloud computing based data centers: a tutorial. Int J Database Theory Appl 12(1):27–42
19.
Zurück zum Zitat Sicaria S, Rizzardia A, Griecob LA, Coen-Porisinia A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 146–164 Sicaria S, Rizzardia A, Griecob LA, Coen-Porisinia A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 146–164
20.
Zurück zum Zitat Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J
21.
Zurück zum Zitat Kocakulak M, Butun I (2017) An overview of wireless sensor networks towards internet of things. In: IEEE 7th annual computing and communication workshop and conference (CCWC), pp 1–6 Kocakulak M, Butun I (2017) An overview of wireless sensor networks towards internet of things. In: IEEE 7th annual computing and communication workshop and conference (CCWC), pp 1–6
22.
Zurück zum Zitat Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, pp 504–509 Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, pp 504–509
23.
Zurück zum Zitat Puthal D, Nepal S, Ranjan R, Chen J (2016) Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Comput 3(3):64–71CrossRef Puthal D, Nepal S, Ranjan R, Chen J (2016) Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Comput 3(3):64–71CrossRef
24.
Zurück zum Zitat Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC). IEEE, pp 1–6 Pongle P, Chavan G (2015) A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 international conference on pervasive computing (ICPC). IEEE, pp 1–6
25.
Zurück zum Zitat Hennebert C, Santos JD (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398CrossRef Hennebert C, Santos JD (2014) Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J 1(5):384–398CrossRef
26.
Zurück zum Zitat Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw 11:2661–2674CrossRef Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw 11:2661–2674CrossRef
27.
Zurück zum Zitat Adnan AH et al (2015) A comparative study of WLAN security protocols: WPA, WPA2. In: Proceedings of international conference on advances in electrical engineering (ICAEE), Dhaka, pp 165–169 Adnan AH et al (2015) A comparative study of WLAN security protocols: WPA, WPA2. In: Proceedings of international conference on advances in electrical engineering (ICAEE), Dhaka, pp 165–169
28.
Zurück zum Zitat Sulaiman AG, Al Shaikhli IF (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. IJCST 5 Sulaiman AG, Al Shaikhli IF (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. IJCST 5
29.
Zurück zum Zitat Gelogo YE, Caytiles RD, Park B (2011) Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security. Int J Control Autom 4(4):179–184 Gelogo YE, Caytiles RD, Park B (2011) Threats and security analysis for enhanced secure neighbor discovery protocol (SEND) of IPv6 NDP security. Int J Control Autom 4(4):179–184
30.
Zurück zum Zitat Neisse R, Steri G, Fovino IN, Baldini G (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76CrossRef Neisse R, Steri G, Fovino IN, Baldini G (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76CrossRef
31.
Zurück zum Zitat Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720CrossRef Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720CrossRef
32.
Zurück zum Zitat Brendel J (2003) World-wide-web server that finds optimal path by sending multiple syn + ack packets to a single client. U.S. Patent 6,587,438, issued 1 July Brendel J (2003) World-wide-web server that finds optimal path by sending multiple syn + ack packets to a single client. U.S. Patent 6,587,438, issued 1 July
33.
Zurück zum Zitat Mishra N, Swagatika S, Singh D (2020) An intelligent framework for analysing terrorism actions using cloud. In: New paradigm in decision science and management. Springer, Singapore, pp 225–235 Mishra N, Swagatika S, Singh D (2020) An intelligent framework for analysing terrorism actions using cloud. In: New paradigm in decision science and management. Springer, Singapore, pp 225–235
34.
Zurück zum Zitat Lu C, Blum BM, Abdelzaher TF, Stankovic JA, He T (2002) RAP: a real-time communication architecture for large-scale wireless sensor networks. University of Virginia: Department of Computer Science, Charlottesville Lu C, Blum BM, Abdelzaher TF, Stankovic JA, He T (2002) RAP: a real-time communication architecture for large-scale wireless sensor networks. University of Virginia: Department of Computer Science, Charlottesville
Metadaten
Titel
Security Threats and Their Mitigations in IoT Devices
verfasst von
Saurabh Gupta
N. Lingareddy
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-69921-5_42

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.