10.1145/3230833.3232800acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicpsprocConference Proceedings
research-article
Free Access

Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains

ABSTRACT

The world is witnessing the emerging role of Internet of Things (IoT) as a technology that is transforming different industries, global community and its economy. Currently a plethora of interconnected smart devices have been deployed for diverse pervasive applications and services, and billions more are expected to be connected to the Internet in the near future. The potential benefits of IoT include improved quality of life, convenience, enhanced energy efficiency, and more productivity. Alongside these potential benefits, however, come increased security risks and potential for abuse. Arguably, this is partly because many IoT start-ups and electronics hobbyists lack security expertise, and some established companies do not make security a priority in their designs, and hence they produce IoT devices that are often ill-equipped in terms of security. In this paper, we discuss different IoT application areas, and identify security threats in IoT architecture. We consider security requirements and present typical security threats for each of the application domains. Finally, we present several possible security countermeasures, and introduce the IoT Hardware Platform Security Advisor (IoT-HarPSecA) framework, which is still under development. IoT-HarPSecA is aimed at facilitating the design and prototyping of secure IoT devices.

References

  1. D. Borio, C. O'Driscoll, and J. Fortuny. 2012. GNSS Jammers: Effects and countermeasures. In 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing. 1--7.Google ScholarGoogle Scholar
  2. P. Boughton. 2018. World's Smallest Seismic Sensor for the Internet of Things. (2018). http://www.engineerlive.com/content/world-s-smallest-seismic-sensor-internet-thingsGoogle ScholarGoogle Scholar
  3. C. Cervantes, D. Poplade, M. Nogueira, and A. Santos. 2015. Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things. In IFIP/IEEE International Symposium on Integrated Network Management (IM). 606--611.Google ScholarGoogle Scholar
  4. H. Chan, A. Perrig, and D. Song. 2003. Random Key Predistribution Schemes for Sensor Networks. In Symposium on Security and Privacy, 2003. 197--213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Das, Rishikesh, and P. N. Astya. 2017. A Relative Survey of Various LEACH based Routing Protocols in Wireless Sensor Networks. In International Conference on Computing, Communication and Automation (ICCCA). 630--636.Google ScholarGoogle Scholar
  6. S. N. Firdous, Z. Baig, C. Valli, and A. Ibrahim. 2017. Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. In IEEE International Conference on Internet of Things (iThings). 748--755.Google ScholarGoogle Scholar
  7. D. Fraunholz, D. Krohmer, S. D. Anton, and H. Dieter Schotten. 2017. Investigation of Cyber Crime Conducted by Abusing Weak or Default Passwords with a Medium Interaction Honeypot. In International Conference on Cyber Security And Protection Of Digital Services (Cyber Security). 1--7.Google ScholarGoogle Scholar
  8. C. C. Grant, A. Jones, A. Hamins, and N. Bryner. Jan., 2015. Realizing the Vision of Smart Fire Fighting. IEEE Potentials 34, 1 (Jan., 2015), 35--40.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Hoque, S. Hassan, M. A. Sadaf, A. Galib, and T. F. Karim. 2015. Earthquake Monitoring and Warning System. In International Conference on Advances in Electrical Engineering (ICAEE). 109--112.Google ScholarGoogle Scholar
  10. M. Ibrahim, A. Elgamri, S. Babiker, and A. Mohamed. 2015. Internet of Things based Smart Environmental Monitoring using the Raspberry-Pi Computer. In 5th International Conference on Digital Information Processing and Communications (ICDIPC). 159--164.Google ScholarGoogle Scholar
  11. G. Kambourakis, C. Kolias, and A. Stavrou. 2017. The Mirai Botnet and the IoT Zombie Armies. In IEEE Military Communications Conference (MILCOM). 267--272.Google ScholarGoogle Scholar
  12. S. Kapoor, H. Pahuja, and B. Singh. 2016. Real Time Monitoring Alert System for Landslide. In 2nd International Conference on Contemporary Computing and Informatics (IC3I). 584--589.Google ScholarGoogle Scholar
  13. G. Kecskemeti, G. Casale, D. N Jha, J. Lyon, and R. Ranjan. 2017. Modelling and Simulation Challenges in Internet of Things. IEEE Cloud Computing 4, 1 (Jan 2017), 62--69.Google ScholarGoogle ScholarCross RefCross Ref
  14. M. Ma, P. Wang, and C. H. Chu. 2018. Redundant Reader Elimination in Large-Scale Distributed RFID Networks. IEEE Internet of Things Journal PP, 99 (2018), 1--1.Google ScholarGoogle Scholar
  15. M. Marjani, F. Nasaruddin, A. Gani, A. Karim, I. A. T. Hashem, A. Siddiqa, and I. Yaqoob. 2017. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges. IEEE Access 5 (2017), 5247--5261.Google ScholarGoogle ScholarCross RefCross Ref
  16. S. Nastic, H. L. Truong, and S. Dustdar. 2017. Data and Control Points: A Programming Model for Resource-constrained IoT Cloud Edge Devices. In IEEE International Conference on Systems, Man, and Cybernetics (SMC). 3535--3540.Google ScholarGoogle Scholar
  17. D. Niewolny. 2014. How the Internet of Things Is Revolutionizing Healthcare. (2014). http://cache.freescale.com/files/corporate/doc/white_paper/IOTREVH\EALCARWP.pdf (accessed 20.02.15).Google ScholarGoogle Scholar
  18. NIST. May, 2015. Research Roadmap for Smart Fire Fighting. Technical Report. 1--223 pages.Google ScholarGoogle Scholar
  19. S. R. Oh and Y. G. Kim. 2017. Security Requirements Analysis for the IoT. In International Conference on Platform Technology and Service (PlatCon). 1--6.Google ScholarGoogle Scholar
  20. A. A. Osuwa, E. B. Ekhoragbon, and L. T. Fat. 2017. Application of Artificial Intelligence in Internet of Things. In 9th International Conference on Computational Intelligence and Communication Networks (CICN). 169--173.Google ScholarGoogle Scholar
  21. S. M. A. Oteafy and H. S. Hassanein. 2018. IoT in the Fog: A Roadmap for Data-Centric IoT Development. IEEE Communications Magazine 56, 3 (MARCH 2018), 157--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Pacheco, D. Ibarra, A. Vijay, and S. Hariri. 2017. IoT Security Framework for Smart Water System. In IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). 1285--1292.Google ScholarGoogle Scholar
  23. B. D. Patel and A. D. Patel. 2016. A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks. In International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE). 121--126.Google ScholarGoogle Scholar
  24. Q. Qi and F. Tao. 2018. Digital Twin and Big Data Towards Smart Manufacturing and Industry 4.0: 360 Degree Comparison. IEEE Access PP, 99 (2018), 1--1.Google ScholarGoogle Scholar
  25. Y. Qiu and M. Ma. 2016. APMIPv6-Based Secured Mobility Scheme for 6LoWPAN. In IEEE Global Communications Conference (GLOBECOM). 1--6.Google ScholarGoogle Scholar
  26. M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio. May, 2018. Challenges of securing Internet of Things devices: A survey. Security and Privacy 1, 2 (May, 2018), e20. arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.20Google ScholarGoogle ScholarCross RefCross Ref
  27. M. G. Samaila, J. B. F. Sequeiros, A. F. P. P. Correia, M. M. Freire, and P. R. M. Inácio. 2018. Networks of the Future. CRC Press, Chapter A Quick Perspective on the Current State of IoT Security: A Survey, 431--464.Google ScholarGoogle Scholar
  28. A. Shifa, M. N. Asghar, and M. Fleury. 2016. Multimedia Security Perspectives in IoT. In Sixth International Conference on Innovative Computing Technology (INTECH). 550--555.Google ScholarGoogle Scholar
  29. S. Singh and N. Singh. 2015. Internet of Things (IoT): Security Challenges, Business Opportunities Reference Architecture for E-commerce. In International Conference on Green Computing and Internet of Things (ICGCIoT). 1577--1581. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. SivaKrishna, P. Rajalakshmi, J. Bandaru, A. Kumar, M. P. R. S. Kiran, M. A. Zubair, and U. B. Desai. 2015. Performance Analysis of Hybrid Multiple Radio IoT Architecture for Ubiquitous Connectivity. In IEEE 2nd World Forum on Internet of Things (WF-IoT). 198--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. E. Smith and L. Fuller. 2017. Control Systems and the Internet of Things -Shrinking the Factory. In 56th FITCE Congress. 68--73.Google ScholarGoogle Scholar
  32. S. W. Soliman, M. A. Sobh, and A. M. Bahaa-Eldin. 2017. Taxonomy of Malware Analysis in the IoT. In 12th International Conference on Computer Engineering and Systems (ICCES). 519--529.Google ScholarGoogle Scholar
  33. W. Sun, J. Liu, and H. Zhang. 2017. When Smart Wearables Meet Intelligent Vehicles: Challenges and Future Directions. IEEE Wireless Communications 24, 3 (Jun. 2017), 58--65.Google ScholarGoogle Scholar
  34. N. Tuptuk and S. Hailes. 2018. Security of smart manufacturing systems. Journal of Manufacturing Systems 47 (2018), 93--106.Google ScholarGoogle ScholarCross RefCross Ref
  35. P. Varga, S. Plosz, G. Soos, and C. Hegedus. May, 2017. Security Threats and Issues in Automation IoT,. In 13th IEEE International Workshop on Factory Communication Systems (WFCS). 1--6.Google ScholarGoogle Scholar
  36. J. Voas. 2016. Demystifying the Internet of Things. Computer 49, 6 (June 2016), 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. wiseGEEK. 2015. What is a Barbie Doll? (2015). http://www.wisegeek.com/what-is-a-barbie-doll.htm (accessed 19.02.15).Google ScholarGoogle Scholar
  38. T. Yalçin. 2016. Compact ECDSA Engine for IoT Applications. Electronics Letters 52, 15 (2016), 1310--1312.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!

      To help support our community working remotely during COVID-19, we are making all work published by ACM in our Digital Library freely accessible through June 30, 2020. Learn more