Security and Privacy Concerns for the Modern Technology of Internet of Things
DOI:
https://doi.org/10.51983/ajeat-2022.11.1.3304Keywords:
Internet of Things (IoT), Security, Privacy, TechnologyAbstract
The Internet of Things (IoT) is present in every aspect of our lives. They are used in our households, in hospitals, and outside to monitor and report environmental improvements, deter fires, and perform a variety of other useful functions. However, both of these advantages can come at the expense of significant security and risks privacy. Several academic research have been conducted to counteract these issues and figure out a better way to remove or minimise the threats to the user’s privacy and protection specifications in IoT devices. The survey is divided into four parts. The first section would look at the most important shortcomings of IoT devices and how to overcome them. The description of IoT attacks will be presented in the second section. The final section would look at security problems at various layers.
References
J. Granjal, E. Monteiro, and J. S. Silva, "A secure interconnection model for IPv6 enabled wireless sensor networks," in IFIP Wireless Days, pp. 1-6, Oct. 2010.
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, vol. 76, pp. 146-164, 2015.
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of Things," Computer Networks: Security and Identity Architecture for the Future Internet, vol. 57, no. 10, pp. 2266-2279, 2013.
W. Trappe, R. Howard, and R. S. Moore, "Low-energy security: Limits and opportunities in the Internet of Things," IEEE Security Privacy, vol. 13, no. 1, pp. 14-21, Jan. 2015.
H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, and W. Hu, "Poster: Towards encrypted query processing for the Internet of Things," in Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, ser. MobiCom ’15, New York, NY, USA: ACM, pp. 251-253, 2015.
R. Kotamsetty and M. Govindarasu, "Adaptive latency-aware query processing on encrypted data for the Internet of Things," in 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1-7, Aug. 2016.
S. A. Salami, J. Baek, K. Salah, and E. Damiani, "Lightweight encryption for smart home," in 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382-388, Aug. 2016.
I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," in IEEE Symposium on Computers and Communication (ISCC), pp. 180-187, July 2015.
E. Ronen and A. Shamir, "Extended functionality attacks on IoT devices: The case of smart lights," in IEEE European Symposium on Security and Privacy (Euro S & P), pp. 3-12, March 2016.
J. Chen, S. Kher, and A. Somani, "Distributed fault detection of wireless sensor networks," in Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, ser. DIWANS ‘06, pp. 65-72, 2006.
A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, ser. Q2SWinet ‘05, pp. 16-23, 2005.
G. Gaubatz, J. P. Kaps, E. Ozturk, and B. Sunar, "State of the art in ultra-low power public key cryptography for wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146-150, March 2005.
Y. Yao, L. T. Yang, and N. N. Xiong, "Anonymity-based privacy-preserving data reporting for participatory sensing," IEEE Internet of Things Journal, Oct. 2015.
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in IEEE S&P, 2008.
David Goldman, "A hacker can give you a fatal overdose," [Online] Available: http://money.cnn.com/2015/06/10/technology/drug-pump-hack/, 2013.
FDA, "Two safety communications on the cybersecurity vulnerabilities of two Hospira infusion pump systems," [Online] Available: http://www.fda.gov/MedicalDevices/Safety/Alertsand Notices/default.htm, 2015.
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), pp. 1-8, June 2011.
A. J. Jara, D. Fernandez, P. Lopez, M. A. Zamora, and A. F. Skarmeta, "Lightweight MIPv6 with IPsec support," in Mobile Information Systems, 2014.
T. Kothmayr, C. Schmitt, W. Hu, M. Bryunig, and G. Carle, "DTLS-based security and two-way authentication for the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2710-2723, Nov. 2013.
S. Raza, D. Trabalza, and T. Voigt, "BlowPan compressed DTLS for CoAP," in 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, pp. 287-289, May 2012.
M. Brachmann, S. L. Keoh, O. G. Morchon, and S. S. Kumar, "End-to-end transport security in the IP-based Internet of Things," in 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1-5, July 2012.
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards viable certificate-based authentication for the Internet of Things," in Proceedings of the 2Nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, ser. HotWiSec ‘13, pp. 37-42, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.