Security Threats to Internet of Things : A Survey
DOI:
https://doi.org/10.32628/IJSRSET229423Keywords:
IoT, Cyber Threats, Network Security, CommunicationAbstract
Internet of things (IoT) is an emerging technology in the present era. The term IoT refers to as an interconnection of several smart nodes through some heterogeneous link for the purpose of data communication. Some particular protocols control the entire communication in IoT. Due to plenitude of devices, it becomes a huge task to check the loyalty status of each node which is going to be a part of IoT environment. These nodes sometimes get involved in some malicious activities which may cause critical threats to this environment. These anonymous activities may include some attack on the working or security of IoT. In this uncongenial circumstance we need a strong security measurement to countermeasure these attacks. Innumerable efforts have been made to improve the security of IoT. This paper is an effort to make a glance of some of these security schemes
References
- Javeed, D., Gao, T., & Khan, M. T. (2021). SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics, 10(8), 918
- Al Razib, M., Javeed, D., Khan, M. T., Alkanhel, R., & Muthanna, M. S. A. (2022). Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework. IEEE Access, 10, 53015-53026.
- Javeed, D., Gao, T., Khan, M. T., & Ahmad, I. (2021). A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT). Sensors, 21(14), 4884.
- Ali, S., Javaid, N., Javeed, D., Ahmad, I., Ali, A., & Badamasi, U. M. (2020, April). A blockchain-based secure data storage and trading model for wireless sensor networks. In International Conference on Advanced Information Networking and Applications (pp. 499-511). Springer, Cham.
- Tamotsu KAWAMURA, Masaru FUKUSHI, Yasushi HIRANO, Yusuke FUJITA and Yoshihiko HAMAMOTO “An NTP-based Detection Module for DDoS Attacks on IoT” 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)
- Anirudh M, Arul Thileeban S. Daniel Jeswin Nallathambi “Use of Honeypots for Mitigating DOS Attacks targeted on IoT Networks” IEEE International Conference on Computer, Communication, and Signal Processing (ICCCSP-2017)
- Javeed, D., Gao, T., Khan, M. T., & Shoukat, D. (2022). A hybrid intelligent framework to combat sophisticated threats in secure industries. Sensors, 22(4), 1582.
- Tanupriya Choudhury, Ayushi Gupta, Saurabh Pradhan, Praveen Kumar, Yokes Singh Rathore, “Privacy and Security of Cloud-Based Internet of Things (IoT)”, 2017 International Conference on Computational Intelligence and Networks
- Weize Yu and Selçuk Köse, “A Lightweight Masked AES Implementation for Securing IoT against CPA Attacks”, IEEE Transactions on circuits and systems
- Jesus Pacheco Salim Hariri, “Anomaly behavior analysis for IoT sensors”, special issue article, WILEY
- Shih-Chang Lin, Chih-Yu Wen, and William A. Sethares, “Two-Tier Device-Based Authentication Protocol against PUEA Attacks for IoT Applications”
- Qussai Yaseen, Monther Aldwairi, Yaser Jararweh, Mahmoud Al-Ayyoub, Brij Gupta, “Collusion attacks mitigation in internet of things: a fog based model”
- Shin-Ming Cheng, Pin-Yu Chen, Ching-Chao Lin, and Hsu-Chun Hsiao, “Traffc-Aware Patching for Cyber Security in Mobile IoT”.
- Javeed, D., Khan, M. T., Ahmad, I., Iqbal, T., Badamasi, U. M., Ndubuisi, C. O., & Umar, A. (2020). An efficient approach of threat hunting using memory forensics. International Journal of Computer Networks and Communications Security, 8(5), 37-45
- Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Kyungroul Lee, Kangbin Yim “A framework for mitigating zero-day attacks in IoT”
- Ahmad, I., Liu, Y., Javeed, D., & Ahmad, S. (2020, May). A decision-making technique for solving order allocation problem using a genetic algorithm. In IOP Conference Series: Materials Science and Engineering (Vol. 853, No. 1, p. 012054). IOP Publishing.
- Ahmad, I., Liu, Y., Javeed, D., Shamshad, N., Sarwr, D., & Ahmad, S. (2020, May). A review of artificial intelligence techniques for selection & evaluation. In IOP Conference Series: Materials Science and Engineering (Vol. 853, No. 1, p. 012055). IOP Publishing.
- Khan, T. U. (2019). Internet of Things (IOT) systems and its security challenges. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 8(12).
- Javeed, D., Badamasi, U. M., Iqbal, T., Umar, A., & Ndubuisi, C. O. (2020). Threat detection using machine/deep learning in IOT environments. International Journal of Computer Networks and Communications Security, 8(8), 59-65.
- Raza, A., Ayub, H., Khan, J. A., Ahmad, I., S Salama, A., Daradkeh, Y. I., ... & Hamam, H. (2022). A Hybrid Deep Learning-Based Approach for Brain Tumor Classification. Electronics, 11(7), 1146.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.