IoT Security: Threats, Risks, Attacks

Author(s):  
Sergei Sokolov ◽  
Vagiz Gaskarov ◽  
Tatiana Knysh ◽  
Albina Sagitova
Author(s):  
Megha Kamble ◽  
Jaspreet Mehra ◽  
Monika Jain

The growing demand of internet of things (IoT) has rendered advancement in the practical fields towards society. In spite of recent advancements and cost effective IoT solutions for smart railway infrastructure, presently, most of the railway gates in India are opened and closed manually. This is a time-consuming process. It is an error-prone system and raises the accident probability. This chapter evaluates and demonstrates the applicability of IoT to resolve the problem of unmanned automatic railway crossing. The aim is to propose a prototype that will control with the help of microcontroller board, IoT sensor integration, and integrating it to machine learning-based image analysis to detect the intermediate real time obstacle (obstacle on the track). This kind of IoT system will also invite potential attacks, and traditional security countermeasures can be inefficient in dynamic IoT environments. So open challenges related to IoT security threats and emerging security mechanisms for security of the proposed smart railway crossing system are also elaborated.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 82721-82743 ◽  
Author(s):  
Vikas Hassija ◽  
Vinay Chamola ◽  
Vikas Saxena ◽  
Divyansh Jain ◽  
Pranav Goyal ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2148 ◽  
Author(s):  
Mookyu Park ◽  
Haengrok Oh ◽  
Kyungho Lee

Internet-of-Things (IoT) is a technology that is extensively being used in various fields. Companies like Samsung, LG, and Apple are launching home appliances that use IoT as a part of their smart home business. Currently, Intelligent Things which combine artificial intelligence (AI) and IoT are being developed. Most of these devices are configured to collect and respond to human behavior (motion, voice, etc.) through built-in sensors. If IoT devices do not ensure high security, personal information could be leaked. This paper describes the IoT security threats that can cause information leakage from a hierarchical viewpoint of cyberspace. In addition, because these smart home-based IoT devices are closely related to human life, considering social damage is a problem. To overcome this, we propose a framework to measure the risk of IoT devices based on security scenarios that can occur in a smart home.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mazen El-Masri ◽  
Eiman Mutwali Abdelmageed Hussain

PurposeBlockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security.Design/methodology/approachAn approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research.FindingsThe literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors’ investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems.Research limitations/implicationsResults suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility.Practical implicationsPractitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals.Originality/valueThis study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.


Author(s):  
Bong-Gyeol Choi ◽  
EuiSeob Jeong ◽  
Sang-Woo Kim

As the number of Internet of Things (IoT) devices increases, services expand and illegal hacking and infringement methods become more sophisticated, an effective solution for blockchain technology is required as a fundamental solution to security threats. In this paper, we develop the security module of an IoT device based on blockchain technology that blocks hacking and information infringement and forms a multi-security blockchain system between the IoT device and the user device and we develop a user application. We contribute to addressing the security threats faced by IoT application services by developing a new method. In particular, we present some schemes for the development of a multi-security certification system based on blockchain for IoT security.


2012 ◽  
Vol 424-425 ◽  
pp. 625-628 ◽  
Author(s):  
Cai Ming Liu ◽  
Si Yu Chen ◽  
Yan Zhang ◽  
Run Chen ◽  
Kui Liang Guo

To resolve the anomaly detection problem in the distributed environment of the Internet of Things (IoT), an artificial immunity-based anomaly detection model for the IoT is proposed in this paper. The proposed model adopts artificial immune mechanisms to recognize anomaly behavior of IoT security threats. It is consisted of Anomaly detection agents (ADA) and Central Service System (CSS). ADA is deployed by the IoT gateway. It collects the initial data of the sense layer of the IoT. It works independently and produces excellent detection elements. It shares its excellent detection elements with the other ones and uploads them to the CSS. Theory analysis shows that the proposed model is able to adapt the local network environment of IoT and improve the anomaly detection ability in the global IoT environment.


In a typical IoT network, a sensor connects to a controller using a wireless connection. Controllers collect data from sensors and sends the data for storage and analysis[1]. These controllers work with actuators that translate an electrical input to a physical action. The internet of things (IoT), have found application in different areas of human endeavor including healthcare, government, supply chain, cities, manufacturing, etc. and it is estimated that the number of connected devices will reach 50 billion by 2020[2] With the increasing number of devices comes an increase in the the varying number of security threats to the IoT network [3]. To contain these threats, a secure-by-design approach should be adopted as this will help the IoT devices to anticipate and neutralize the ever changing nature of the threats as against older systems where security was handled as it presents itself [2] This paper x-rays the security challenges in IoT networks and the application of machine learning (Supervised learning, Unsupervised learning and Reinforcement learning) in tackling the security challenges


Sign in / Sign up

Export Citation Format

Share Document