A COMPREHENSIVE STUDY OF THE IOT ATTACKS ON DIFFERENT LAYERS

Authors

  • Khushpreet Singh
  • Dr. Nirvair Neeru

Keywords:

Internet of Things, Security, Vulnerability, Sensors, Layered-Architecture.

Abstract

A key innovation in utilizing the enormous capacity of wireless media in the physical world is the internet of things. The internet of things' (IoT) recent explosive expansion is a result of its versatility, adaptability, and intelligence. Most Internet of Things (IoT) apps run tasks automatically, without interacting with people or real-world items. By connecting with a variety of smart programs that are running independently on various platforms, practically everywhere in the globe, we may manage our surroundings. The potential threats in the five layers of IoT are specifically reviewed in this paper. In this study, we will outline various IoT components i.e. (architecture, IoT Security attacks, Attacks and Targeted Layer of IoT) and the general description of IoT-layered security. In this paper, author discuss the IoT attacks which are performed on different layers of IoT architecture. We have discussed security attacks in detail in this paper with relation to various IoT layer types. We recently presented a few of the IoT's uses. This study will help academics and manufacturers assess and narrow the attack surface area on IoT devices.

References

Ahanger, T. A., & Aljumah, A. (2019). Internet of things: A comprehensive study of security issues and defense mechanisms. IEEE Access, 7, 11020–11028. https://doi.org/10.1109/ACCESS.2018.2876939

Ahemd, M. M., Shah, M. A., & Wahid, A. (2017). IoT security: A layered approach for attacks & defenses. International Conference on Communication Technologies, ComTech 2017, 104–110. https://doi.org/10.1109/COMTECH.2017.8065757

Almusaylim, Z. A., & Zaman, N. (2019). A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wireless Networks, 25(6), 3193–3204. https://doi.org/10.1007/s11276-018-1712-5

Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2016). Internet of Things: Security vulnerabilities and challenges. Proceedings - IEEE Symposium on Computers and Communications, 2016-Febru, 180–187. https://doi.org/10.1109/ISCC.2015.7405513

Articles, A. L. L., Articles, E., Books, C. S., Plan, M., & In, L. O. G. (n.d.). What is Replay Attack ? How does Replay Attack work ? 1–16.

Choudhary, S., & Kesswani, N. (2019). A Survey : Intrusion Detection Techniques. January. https://doi.org/10.4018/IJISP.2019010107

DATA FOUNDARY. (2021). What is a Permanent DoS (PDoS) Attack? Https://Www.Datafoundry.Com/Blog/What-Is-a-Permanent-Dos-Pdos-Attack, 2021(C), 22–25.

Džaferović, E., Sokol, A., Almisreb, A. A., & Mohd Norzeli, S. (2019). DoS and DDoS vulnerability of IoT: A review. Sustainable Engineering and Innovation, 1(1), 43–48. https://doi.org/10.37868/sei.v1i1.36

Hameed, S., Khan, F. I., & Hameed, B. (2019). Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. Journal of Computer Networks and Communications, 2019. https://doi.org/10.1155/2019/9629381

Hsueh, C. T., Wen, C. Y., & Ouyang, Y. C. (2015). A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sensors Journal, 15(6), 3590–3602. https://doi.org/10.1109/JSEN.2015.2395442

Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., & Bangash, Y. A. (2020). An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security. IEEE Internet of Things Journal, 7(10), 10250–10276. https://doi.org/10.1109/JIOT.2020.2997651

Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501. https://doi.org/10.1007/s11276-014-0761-7

Lu, Y., & Xu, L. Da. (2019). Internet of things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115. https://doi.org/10.1109/JIOT.2018.2869847

Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602. https://doi.org/10.1109/TETC.2016.2606384

Nandy, T., Idris, M. Y. I. Bin, Md Noor, R., Mat Kiah, M. L., Lun, L. S., Annuar Juma’At, N. B., Ahmedy, I., Abdul Ghani, N., & Bhattacharyya, S. (2019). Review on Security of Internet of Things Authentication Mechanism. IEEE Access, 7(October), 151054–151089. https://doi.org/10.1109/ACCESS.2019.2947723

Navani, D., Jain, S., & Nehra, M. S. (2018). The internet of things (IoT): A study of architectural elements. Proceedings - 13th International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2017, 2018-Janua, 473–478. https://doi.org/10.1109/SITIS.2017.83

Padmanabhan, S., Maruthi, R., & Anitha, R. (2022). An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks. Global Transitions Proceedings, 3(1), 55–59. https://doi.org/10.1016/j.gltp.2022.04.013

Perwej, Y., Parwej, F., Mohamed Hassan, M. M., & Akhtar, N. (2019). The Internet-of-Things (IoT) Security : A Technological Perspective and Review. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, February, 462–482. https://doi.org/10.32628/cseit195193

Riahi Sfar, A., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137. https://doi.org/10.1016/j.dcan.2017.04.003

Sengupta, J., Ruj, S., & Das Bit, S. (2020). A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. In Journal of Network and Computer Applications (Vol. 149, p. 102481). Elsevier Ltd. https://doi.org/10.1016/j.jnca.2019.102481

Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017. https://doi.org/10.1155/2017/9324035

Shah, Z., Ullah, I., Li, H., Levula, A., & Khurshid, K. (2022). Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors, 22(3). https://doi.org/10.3390/s22031094

Singh, S., & Saini, H. S. (2021). Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN. Wireless Personal Communications, 118(1), 789–814. https://doi.org/10.1007/s11277-020-08044-0

Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020). A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Communications Surveys and Tutorials, 22(2), 1191–1221. https://doi.org/10.1109/COMST.2019.2962586

Wright, G. (n.d.). side-channel attack. 1–7.

Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258. https://doi.org/10.1109/JIOT.2017.2694844

Downloads

Published

2024-02-29

How to Cite

Khushpreet Singh, & Dr. Nirvair Neeru. (2024). A COMPREHENSIVE STUDY OF THE IOT ATTACKS ON DIFFERENT LAYERS. Journal Punjab Academy of Sciences, 23, 140–155. Retrieved from http://jpas.in/index.php/home/article/view/86