Skip to main content

2020 | OriginalPaper | Buchkapitel

Security Threats, Attacks, and Possible Countermeasures in Internet of Things

verfasst von : Shams Tabrez Siddiqui, Shadab Alam, Riaz Ahmad, Mohammed Shuaib

Erschienen in: Advances in Data and Information Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The idea to connect everything to anything and at any point of time is what vaguely defines the concept of Internet of Things (IoT). The concept of IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years. The pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some serious threats with regard to security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the greatest concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to a number of attacks by the attackers at each layer of IoT. The IoT has layered structure, where each layer provides a service. The security vary from layer to layer as each layer serves a different purpose. The aim of this paper is to analyze the various security and privacy threats related to IoT. Furthermore, this paper also discusses numerous existing security protocols operating at different layers, potential attacks, and suggested countermeasures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef
2.
Zurück zum Zitat Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 9, 51–58.CrossRef Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 9, 51–58.CrossRef
3.
Zurück zum Zitat Horrow, S., & Sardana, A. (2012). Identity management framework for cloud based internet of things. In Proceedings of the First International Conference on Security of Internet of Things (pp. 200–203). ACM. Horrow, S., & Sardana, A. (2012). Identity management framework for cloud based internet of things. In Proceedings of the First International Conference on Security of Internet of Things (pp. 200–203). ACM.
4.
Zurück zum Zitat Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274. Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274.
5.
Zurück zum Zitat Aazam, M., St-Hilaire, M., Lung, C. H., & Lambadaris, I. (2016). PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 12–17). IEEE. Aazam, M., St-Hilaire, M., Lung, C. H., & Lambadaris, I. (2016). PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 12–17). IEEE.
6.
Zurück zum Zitat Jiang, H., Shen, F., Chen, S., Li, K. C., & Jeong, Y. S. (2015). A secure and scalable storage system for aggregate data in IoT. Future Generation Computer Systems, 49, 133–141.CrossRef Jiang, H., Shen, F., Chen, S., Li, K. C., & Jeong, Y. S. (2015). A secure and scalable storage system for aggregate data in IoT. Future Generation Computer Systems, 49, 133–141.CrossRef
7.
Zurück zum Zitat Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: A security point of view. Internet Research, 26(2), 337–359.CrossRef Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: A security point of view. Internet Research, 26(2), 337–359.CrossRef
8.
Zurück zum Zitat Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.CrossRef Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.CrossRef
9.
Zurück zum Zitat Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1–6). IEEE. Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1–6). IEEE.
10.
Zurück zum Zitat Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: Open issues and challenges. Wireless Networks, 20(8), 2201–2217.CrossRef Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: Open issues and challenges. Wireless Networks, 20(8), 2201–2217.CrossRef
11.
Zurück zum Zitat Sethi, P., & Sarangi, S. R. (2017). Internet of things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering. Sethi, P., & Sarangi, S. R. (2017). Internet of things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering.
12.
Zurück zum Zitat Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11–17. Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11–17.
13.
Zurück zum Zitat Locke, D. (2010). Mq telemetry transport (mqtt) v3. 1 protocol specification. IBM developer Works Technical Library. Locke, D. (2010). Mq telemetry transport (mqtt) v3. 1 protocol specification. IBM developer Works Technical Library.
14.
Zurück zum Zitat Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015). Secure mqtt for internet of things (iot). In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 746–751). IEEE. Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015). Secure mqtt for internet of things (iot). In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 746–751). IEEE.
15.
Zurück zum Zitat OASIS, O. S. (2012). OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0. Burlington, MA, USA: OASIS. OASIS, O. S. (2012). OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0. Burlington, MA, USA: OASIS.
16.
Zurück zum Zitat Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., & Alexander, R. (2012). RPL: IPv6 routing protocol for low-power and lossy networks (No. RFC 6550). Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., & Alexander, R. (2012). RPL: IPv6 routing protocol for low-power and lossy networks (No. RFC 6550).
17.
Zurück zum Zitat Aijaz, A., & Aghvami, A. H. (2015). Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective. IEEE Internet of Things Journal, 2(2), 103–112.CrossRef Aijaz, A., & Aghvami, A. H. (2015). Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective. IEEE Internet of Things Journal, 2(2), 103–112.CrossRef
18.
Zurück zum Zitat Zhou, Z., Yao, B., Xing, R., Shu, L., & Bu, S. (2016). E-CARP: An energy efficient routing protocol for UWSNs in the internet of underwater things. IEEE Sensors Journal, 16(11), 4072–4082.CrossRef Zhou, Z., Yao, B., Xing, R., Shu, L., & Bu, S. (2016). E-CARP: An energy efficient routing protocol for UWSNs in the internet of underwater things. IEEE Sensors Journal, 16(11), 4072–4082.CrossRef
19.
Zurück zum Zitat Dujovne, D., Watteyne, T., Vilajosana, X., & Thubert, P. (2014). 6TiSCH: Deterministic IP-enabled industrial internet (of things). IEEE Communications Magazine, 52(12), 36–41.CrossRef Dujovne, D., Watteyne, T., Vilajosana, X., & Thubert, P. (2014). 6TiSCH: Deterministic IP-enabled industrial internet (of things). IEEE Communications Magazine, 52(12), 36–41.CrossRef
20.
Zurück zum Zitat Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches. IEEE Communications Magazine, 51(6), 86–93.CrossRef Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches. IEEE Communications Magazine, 51(6), 86–93.CrossRef
21.
Zurück zum Zitat Yassein, M. B., Mardini, W., & Khalil, A. (2016). Smart homes automation using Z-wave protocol. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1–6). Yassein, M. B., Mardini, W., & Khalil, A. (2016). Smart homes automation using Z-wave protocol. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1–6).
22.
Zurück zum Zitat Wang, C., Jiang, T., & Zhang, Q. (2016). ZigBee® network protocols and applications. Auerbach Publications. 604 pp. Wang, C., Jiang, T., & Zhang, Q. (2016). ZigBee® network protocols and applications. Auerbach Publications. 604 pp.
23.
Zurück zum Zitat Cetinkaya, O., & Akan, O. B. (2015). A DASH7-based power metering system. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (pp. 406–411). IEEE. Cetinkaya, O., & Akan, O. B. (2015). A DASH7-based power metering system. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (pp. 406–411). IEEE.
25.
Zurück zum Zitat Salman, T., & Jain, R. (2017). Networking Protocols and Standards for Internet of Things. Wiley. Salman, T., & Jain, R. (2017). Networking Protocols and Standards for Internet of Things. Wiley.
26.
Zurück zum Zitat Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends. Wireless Communications and Mobile Computing. Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends. Wireless Communications and Mobile Computing.
27.
Zurück zum Zitat Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. In 2014 International Conference On Privacy And Security In Mobile Systems (Prisms) (pp. 1–8). IEEE. Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. In 2014 International Conference On Privacy And Security In Mobile Systems (Prisms) (pp. 1–8). IEEE.
28.
Zurück zum Zitat Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th International Conference On Service-Oriented Computing And Applications (pp. 230–234). IEEE. Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th International Conference On Service-Oriented Computing And Applications (pp. 230–234). IEEE.
29.
Zurück zum Zitat Migault, D., Palomares, D., Herbert, E., You, W., Ganne, G., Arfaoui, G., & Laurent, M. (2012). E2e: An optimized ipsec architecture for secure and fast offload. In 2012 Seventh International Conference on Availability, Reliability and Security (pp. 365–374). IEEE. Migault, D., Palomares, D., Herbert, E., You, W., Ganne, G., Arfaoui, G., & Laurent, M. (2012). E2e: An optimized ipsec architecture for secure and fast offload. In 2012 Seventh International Conference on Availability, Reliability and Security (pp. 365–374). IEEE.
31.
Zurück zum Zitat El Mouaatamid, O., Lahmer, M., & Belkasmi, M. (2016). Internet of Things Security: Layered classification of attacks and possible Countermeasures. Electronic Journal of Information Technology, (9). El Mouaatamid, O., Lahmer, M., & Belkasmi, M. (2016). Internet of Things Security: Layered classification of attacks and possible Countermeasures. Electronic Journal of Information Technology, (9).
Metadaten
Titel
Security Threats, Attacks, and Possible Countermeasures in Internet of Things
verfasst von
Shams Tabrez Siddiqui
Shadab Alam
Riaz Ahmad
Mohammed Shuaib
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0694-9_5

Neuer Inhalt