CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Internet of Things Privacy, Security and Attacks

by V. Harsha Shastri, K. Srinivas Rao, Raman R.K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 22
Year of Publication: 2024
Authors: V. Harsha Shastri, K. Srinivas Rao, Raman R.K.
10.5120/ijca2024923667

V. Harsha Shastri, K. Srinivas Rao, Raman R.K. . Internet of Things Privacy, Security and Attacks. International Journal of Computer Applications. 186, 22 ( May 2024), 49-57. DOI=10.5120/ijca2024923667

@article{ 10.5120/ijca2024923667,
author = { V. Harsha Shastri, K. Srinivas Rao, Raman R.K. },
title = { Internet of Things Privacy, Security and Attacks },
journal = { International Journal of Computer Applications },
issue_date = { May 2024 },
volume = { 186 },
number = { 22 },
month = { May },
year = { 2024 },
issn = { 0975-8887 },
pages = { 49-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number22/internet-of-things-privacy-security-and-attacks/ },
doi = { 10.5120/ijca2024923667 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-05-31T22:31:56.858805+05:30
%A V. Harsha Shastri
%A K. Srinivas Rao
%A Raman R.K.
%T Internet of Things Privacy, Security and Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 22
%P 49-57
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data protection and anonymity is a major issue with the Internet of Things. Problems may arise as a result of ineffective security measures, human ignorance, or outdated device software. Smart devices are vulnerable to hacking. A billion connected devices could be used to access private data, spread malware and cause harm. Businesses, consumers, and even Government agencies use Internet of Things devices and concern is always there in terms of security for manufacturers and end users. The Internet of Things helps to improve business efficiency and simplifies employees' work. The transportation, agricultural, healthcare, and building sectors are among the many that are making more use of this technology. It is challenging to safeguard most Internet-connected "things" with traditional, resource-intensive defenses since these devices are often poor and have limited hardware capabilities; this raises serious privacy and security challenges.

References
  1. Foundation Fieldbus [Internet]. Available from: http://www.foundationfieldbus.com/ [Accessed: 2021-01-11]
  2. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017.
  3. R. H. Weber, “Internet of things: privacy issues revisited,” Computer Law and Security Review, vol. 31, no. 5, pp. 618–627, 2015.
  4. A. Gopi and M. K. Rao, “Survey of privacy and security issues in IoT,” International Journal of Engineering & Technology, vol. 7, no. 2.7, p. 293, 2018.
  5. N. Aleisa and K. Renaud, “Privacy of the Internet of Things: a systematic literature review,” in Proceedings of the 50th Hawaii International Conference on System Sciences, pp. 1–10, Hilton Waikoloa Village, Hawaii, 2017.
  6. A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, 2020.
  7. M. B. M. Noor and W. H. Hassan, “Current research on Internet of Things (IoT) security: a survey,” Computer Networks, vol. 148, pp. 283–294, 2019.
  8. J. Sengupta, S. Ruj, and S. Das Bit, “A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol. 149, article 102481, 2020.
  9. Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, “Blockchain for the IoT and industrial IoT: a review,” Internet of Things, vol. 10, article 100081, 2019.
  10. R. H. Weber, “Internet of Things – new security and privacy challenges,” Computer Law & Security Review, vol. 26, no. 1, pp. 23–30, 2010.
  11. M. A. Khan and K. Salah, “IoT security: review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, 2018.
  12. Y. Qian, Y. Jiang, J. Chen et al., “Towards decentralized IoT security enhancement: a blockchain approach,” Computers and Electrical Engineering, vol. 72, pp. 266–273, 2018.
  13. A. Sultan, M. A. Mushtaq, and M. Abubakar, “IOT security issues via blockchain: a review paper,” in Proceedings of the 2019 International Conference on Blockchain Technology, pp. 60–65, Espoo, Finland, 2019.
  14. Tawalbeh, L.A.; Tawalbeh, H. Lightweight crypto and security. In Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications; Wiley: West Sussex, UK, 2017; pp. 243–261
  15. Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. Available online: https://ieeexplore.ieee.org/abstract/document/7442758 (accessed on 10 April 2020)
  16. The Zephyr Project [Internet]. Available from: https://zephyrproject.org/ [Accessed: 2021-02-05].
  17. Cheruvu, S., Kumar, A., Smith, N., & Wheeler, D. M. (2020). Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment (p. 488). Springer Nature.
  18. Top 50 Products By Total Number Of "Distinct" Vulnerabilities [Internet]. Available from: https://www.cvedetails.com/top-50-products.php [Accessed: 2021-01-12].
  19. Finn, N. (2018). Introduction to time-sensitive networking. IEEE Communications Standards Magazine, 2(2), 22-28.
  20. Schwarz, M. H., & Börcsök, J. (2013, October). A survey on OPC and OPC-UA: About the standard, developments and investigations. In 2013 XXIV International Conference on Information, Communication and Automation Technologies (ICAT) (pp. 1-6). IEEE.
  21. M. Abomhara and G. M. K. Ien, “Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks,” Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65–88, 2015.
  22. J. Deogirikar and A. Vidhate, “Security attacks in IoT: a survey,” in 2017 International Conference on I-SMAC, pp. 32–37, Palladam, India, 2017.
  23. S. Bhunia and M. Tehranipoor, Eds.“Physical Attacks and Countermeasures,” in Hardware Security, pp. 245–290, Morgan Kaufmann, 2019.
  24. M. Hutle and M. Kammerstetter, “Resilience against physical attacks,” in Smart Grid Security, pp. 79–112, Syngress, Boston, USA, 2015.
  25. A. Fadele, M. Othman, I. Hashem, I. Yaqoob, M. Imran, and M. Shoaib, “A novel countermeasure technique for reactive jamming attack in Internet of Things,” Multimedia Tools and Applications, vol. 78, 2019.
  26. H. Li, Y. Chen, and Z. He, “The survey of RFID attacks and defenses,” in 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4, Shanghai, China, 2012.
  27. M. El-hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, “A survey of Internet of Things (IoT) authentication schemes,” Sensors, vol. 19, no. 5, 2019.
  28. P. Ganapathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” International Journal of Computer Science and Information Security, vol. 4, 2009.
  29. M. Lehtonen, D. Ostojic, A. Ilic, and F. Michahelles, “Securing RFID systems by detecting tag cloning,” in Lecture Notes in Computer Science, vol. 5538, pp. 291–308, Springer, Berlin, Heidelberg, 2009.
  30. M. Obaidat, S. Obeidat, J. Holst, A. al Hayajneh, and J. Brown, “A comprehensive and systematic survey on the Internet of Things: security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures,” Computers, vol. 9, p. 44, 2020.
  31. H. Akram, D. Konstantas, and M. Mahyoub, “A comprehensive IoT attacks survey based on a building-blocked reference model,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, 2018.
  32. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976–1986, San Francisco, CA, USA, 2003.
  33. A. Mosenia and N. K. Jha, “A comprehensive study of security of Internet-of-Things,” IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, 2017.
  34. [34] B. Mustafa, M. W. Iqbal, M. Saeed, A. R. Shafqat, H. Sajjad, and M. R. Naqvi, “IOT based low-cost smart home automation system,” in 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications, pp. 1–6, Ankara, Turkey, 2021.
  35. M. Nawir, A. Amir, N. Yaakob, and O. B. Lynn, “Internet of Things (IoT): taxonomy of security attacks,” in 2016 3rd international conference on electronic design, pp. 321–326, Phuket, Thailand, 2016.
  36. K. Zhang, X. Liang, R. Lu, and X. Shen, “Sybil attacks and their defenses in the Internet of Things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372–383, 2014.
  37. D. Sisodia, On the State of Internet of Things Security: Vulnerabilities, Attacks, and Recent Countermeasures, University of Oregon, 2020.
  38. L. Bysani and A. Turuk, “A survey on selective forwarding attack in wireless sensor networks,” in 2011 International Conference on Devices and Communications, pp. 1–5, Mesra, India, 2011.
  39. A. Mayzaud, R. Badonnel, and I. Chrisment, “A taxonomy of attacks in RPL-based Internet of Things,” International Journal Of Network Security, vol. 18, no. 3, pp. 459–473, 2016.
  40. M. M. Ahemd, M. A. Shah, and A. Wahid, “IoT security: a layered approach for attacks defenses,” in 2017 International Conference on Communication Technologies, pp. 104–110, Rawalpindi, Pakistan, 2017.
  41. E. Ronen, A. Shamir, A. O. Weingarten, and C. O’Flynn, “IoT goes nuclear: creating a zig bee chain reaction,” in 2017 IEEE symposium on security and privacy, pp. 195–212, San Jose, CA, USA, 2017.
  42. M. M. Ogonji, G. Okeyo, and J. M. Wafula, “A survey on privacy and security of Internet of Things,” Computer Science Review, vol. 38, article 100312, 2020.
  43. C. Dong, G. He, X. Liu, Y. Yang, and W. Guo, “A multi-layer hardware trojan protection framework for IoT chips,” IEEE Access, vol. 7, pp. 23628–23639, 2019.
  44. A. Tsow, “Phishing with consumer electronics-malicious home routers,” MTW, vol. 190, 2006.
  45. D. Yin, L. Zhang, and K. Yang, “A DDoS attack detection and mitigation with software-defined Internet of Things framework,” IEEE Access, vol. 6, pp. 24694–24705, 2018.
  46. J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004.
  47. L. Qian, Z. Zhu, J. Hu, and S. Liu, “Research of SQL injection attack and prevention technology,” in 2015 International Conference on Estimation, Detection and Information Fusion, pp. 303–306, Harbin, China, 2015.
  48. B. Bencsáth, G. Pék, L. Buttyán, and M. Félegyházi, Duqu: analysis, detection, and lessons learned, ACM European Workshop on System Security, Bern, Switzerland, 2012.
  49. U. Sabeel and S. Maqbool, “Categorized security threats in the wireless sensor networks: countermeasures and security management schemes,” International Journal of Computers and Applications, vol. 64, no. 16, pp. 19–28, 2013.
  50. A. Mohanty, I. Obaidat, F. Yilmaz, and M. Sridhar, “Control-hijacking vulnerabilities in IoT firmware: a brief survey,” in Proceedings of the 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec), and attack taxonomy, New York, USA, 2015.
  51. I. Naumann and G. Hogben, “Privacy features of European eID card specifications,” Network Security, vol. 2008, no. 8, pp. 9–13, 2008.
  52. H. D. Tsague and B. Twala, “Practical techniques for securing the Internet of Things (IoT) against side channel attacks,” in Internet of things and big data analytics toward next-generation intelligence, pp. 439–481, Springer, 2018.
  53. H. Y. Ghafoor, A. Jaffar, R. Jahangir, M. W. Iqbal, and M. Z. Abbas, “Fake news identification on social media using machine learning techniques,” in Lecture Notes in Networks and Systems, pp. 87–98, Springer, Singapore, 2022.
  54. A. A. Pammu, K.-S. Chong, W.-G. Ho, and B.-H. Gwee, “Interceptive side channel attack on AES-128 wireless communications for IoT applications,” in 2016 IEEE Asia Pacific Conference on Circuits and Systems, pp. 650–653, Jeju, Korea, 2016.
  55. S. Sidhu, B. J. Mohd, and T. Hayajneh, “Hardware security in IoT devices with emphasis on hardware trojans,” Journal of Sensor and Actuator Networks, vol. 8, no. 3, 2019.
  56. A. Sayakkara, N. A. Le-Khac, and M. Scanlon, “Leveraging electromagnetic side-channel analysis for the investigation of IoT devices,” Digital Investigation, vol. 29, pp. S94–S103, 2019.
  57. D. Shree and S. Ahlawat, “A review on cryptography, attacks and cyber security,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017.
  58. S. S. Kulkarni, H. M. Rai, and S. Singla, “Design of an effective substitution cipher algorithm for information security using fuzzy logic,” International Journal of Innovations in Engineering and Technology, vol. 1, no. 2, 2012.
  59. R. Datta and N. Marchang, “Chapter 7-security for mobile ad hoc networks,” in Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 147–190, Morgan Kaufmann, Boston, USA, 2012.
  60. C. Li, “Security of wireless sensor networks: current status and key issues,” Smart Wireless Sensor Networks, vol. 14, pp. 299–313, 2010.
  61. I. Butun, P. Österberg, and H. Song, “Security of the Internet of Things: vulnerabilities, attacks, and countermeasures,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616–644, 2020.
  62. D. He, S. Chan, and M. Guizani, “Security in the Internet of Things supported by mobile edge computing,” IEEE Communications Magazine, vol. 56, no. 8, pp. 56–61, 2018.
  63. K. Somasundaram and K. Selvam, “IOT – attacks and challenges,” International Journal of Engineering and Technical Research, vol. 8, no. 9, 2018.
  64. D. Stiawan, M. Y. Idris, R. F. Malik, S. Nurmaini, N. Alsharif, and R. Budiarto, “Investigating brute force attack patterns in IoT network,” Journal of Electrical and Computer Engineering, vol. 2019, Article ID 4568368, 13 pages, 2019.
  65. T. Wang, G. Zhang, A. Liu, M. Z. A. Bhuiyan, and Q. Jin, “A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4831–4843, 2019.
  66. M. D. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security issues, challenges, and open problems in the Internet of Things,” in 2015 IEEE World Congress on Services, pp. 21–28, New York, NY, USA, 2015.
  67. S. Alanazi, J. Al-Muhtadi, A. Derhab et al., “On resilience of wireless mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications,” in 2015 17th International Conference on E-health Networking, Application Services, pp. 205–210, Boston, MA, USA, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT) privacy security attacks networks