Skip to main content

Security Threats, Attacks, and Possible Countermeasures in Internet of Things

  • Conference paper
  • First Online:
Advances in Data and Information Sciences

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 94))

Abstract

The idea to connect everything to anything and at any point of time is what vaguely defines the concept of Internet of Things (IoT). The concept of IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years. The pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some serious threats with regard to security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the greatest concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to a number of attacks by the attackers at each layer of IoT. The IoT has layered structure, where each layer provides a service. The security vary from layer to layer as each layer serves a different purpose. The aim of this paper is to analyze the various security and privacy threats related to IoT. Furthermore, this paper also discusses numerous existing security protocols operating at different layers, potential attacks, and suggested countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  2. Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. Computer, 9, 51–58.

    Article  Google Scholar 

  3. Horrow, S., & Sardana, A. (2012). Identity management framework for cloud based internet of things. In Proceedings of the First International Conference on Security of Internet of Things (pp. 200–203). ACM.

    Google Scholar 

  4. Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274.

    Google Scholar 

  5. Aazam, M., St-Hilaire, M., Lung, C. H., & Lambadaris, I. (2016). PRE-Fog: IoT trace based probabilistic resource estimation at Fog. In 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 12–17). IEEE.

    Google Scholar 

  6. Jiang, H., Shen, F., Chen, S., Li, K. C., & Jeong, Y. S. (2015). A secure and scalable storage system for aggregate data in IoT. Future Generation Computer Systems, 49, 133–141.

    Article  Google Scholar 

  7. Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: A security point of view. Internet Research, 26(2), 337–359.

    Article  Google Scholar 

  8. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

    Article  Google Scholar 

  9. Pongle, P., & Chavan, G. (2015). A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 International Conference on Pervasive Computing (ICPC) (pp. 1–6). IEEE.

    Google Scholar 

  10. Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: Open issues and challenges. Wireless Networks, 20(8), 2201–2217.

    Article  Google Scholar 

  11. Sethi, P., & Sarangi, S. R. (2017). Internet of things: Architectures, protocols, and applications. Journal of Electrical and Computer Engineering.

    Google Scholar 

  12. Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., & Alonso-Zarate, J. (2015). A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), 11–17.

    Google Scholar 

  13. Locke, D. (2010). Mq telemetry transport (mqtt) v3. 1 protocol specification. IBM developer Works Technical Library.

    Google Scholar 

  14. Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P. (2015). Secure mqtt for internet of things (iot). In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 746–751). IEEE.

    Google Scholar 

  15. OASIS, O. S. (2012). OASIS Advanced Message Queuing Protocol (AMQP) Version 1.0. Burlington, MA, USA: OASIS.

    Google Scholar 

  16. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., & Alexander, R. (2012). RPL: IPv6 routing protocol for low-power and lossy networks (No. RFC 6550).

    Google Scholar 

  17. Aijaz, A., & Aghvami, A. H. (2015). Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective. IEEE Internet of Things Journal, 2(2), 103–112.

    Article  Google Scholar 

  18. Zhou, Z., Yao, B., Xing, R., Shu, L., & Bu, S. (2016). E-CARP: An energy efficient routing protocol for UWSNs in the internet of underwater things. IEEE Sensors Journal, 16(11), 4072–4082.

    Article  Google Scholar 

  19. Dujovne, D., Watteyne, T., Vilajosana, X., & Thubert, P. (2014). 6TiSCH: Deterministic IP-enabled industrial internet (of things). IEEE Communications Magazine, 52(12), 36–41.

    Article  Google Scholar 

  20. Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches. IEEE Communications Magazine, 51(6), 86–93.

    Article  Google Scholar 

  21. Yassein, M. B., Mardini, W., & Khalil, A. (2016). Smart homes automation using Z-wave protocol. In 2016 International Conference on Engineering & MIS (ICEMIS) (pp. 1–6).

    Google Scholar 

  22. Wang, C., Jiang, T., & Zhang, Q. (2016). ZigBee® network protocols and applications. Auerbach Publications. 604 pp.

    Google Scholar 

  23. Cetinkaya, O., & Akan, O. B. (2015). A DASH7-based power metering system. In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (pp. 406–411). IEEE.

    Google Scholar 

  24. https://standards.ieee.org/standard/802.11ah-2016.html.

  25. Salman, T., & Jain, R. (2017). Networking Protocols and Standards for Internet of Things. Wiley.

    Google Scholar 

  26. Triantafyllou, A., Sarigiannidis, P., & Lagkas, T. D. (2018). Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends. Wireless Communications and Mobile Computing.

    Google Scholar 

  27. Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. In 2014 International Conference On Privacy And Security In Mobile Systems (Prisms) (pp. 1–8). IEEE.

    Google Scholar 

  28. Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th International Conference On Service-Oriented Computing And Applications (pp. 230–234). IEEE.

    Google Scholar 

  29. Migault, D., Palomares, D., Herbert, E., You, W., Ganne, G., Arfaoui, G., & Laurent, M. (2012). E2e: An optimized ipsec architecture for secure and fast offload. In 2012 Seventh International Conference on Availability, Reliability and Security (pp. 365–374). IEEE.

    Google Scholar 

  30. https://support.portswigger.net/customer/portal/articles/1965728-using-burp-to-test-for-security-misconfiguration-issues.

  31. El Mouaatamid, O., Lahmer, M., & Belkasmi, M. (2016). Internet of Things Security: Layered classification of attacks and possible Countermeasures. Electronic Journal of Information Technology, (9).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Riaz Ahmad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Siddiqui, S.T., Alam, S., Ahmad, R., Shuaib, M. (2020). Security Threats, Attacks, and Possible Countermeasures in Internet of Things. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0694-9_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0693-2

  • Online ISBN: 978-981-15-0694-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics