Anatomy of Threats to the Internet of Things

被引:173
|
作者
Makhdoom, Imran [1 ]
Abolhasan, Mehran [1 ]
Lipman, Justin [1 ]
Liu, Ren Ping [1 ]
Ni, Wei [2 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Sydney, NSW 2007, Australia
[2] CSIRO, Data61, Marsfield, NSW 2122, Australia
来源
关键词
Threats to the IoT; Internet of Things; malware attacks on the Internet of Things; attack methodology; security and privacy; IoT security framework; security guidelines; FULLY HOMOMORPHIC ENCRYPTION; AUTHENTICATION SCHEME; SECURITY ISSUES; NETWORKS; CLOUD; COMMUNICATION; SERVICES; MALWARE; ATTACKS;
D O I
10.1109/COMST.2018.2874978
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to c-Health, e-Commerce, smart cities, supply chain management, smart cars, cyber physical systems (CPS), and a lot more. Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed, and analyzed. The big data analytics is no doubt beneficial for business development. However, at the same time, numerous threats to the availability and privacy of the user data, message, and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical compromise of devices pose a significant danger to the sustenance of IoT. This paper thus endeavors to highlight most of the known threats at various layers of the IoT architecture with a focus on the anatomy of malware attacks. We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT, including ICS and CPS. We also deduce an attack strategy of a distributed denial of service attack through IoT botnet followed by requisite security measures. In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and some open research challenges.
引用
收藏
页码:1636 / 1675
页数:40
相关论文
共 50 条
  • [1] Internet of Things Applications: Opportunities and Threats
    Amir Masoud Rahmani
    Suleyman Bayramov
    Behnam Kiani Kalejahi
    [J]. Wireless Personal Communications, 2022, 122 : 451 - 476
  • [2] The Internet of Things: Trends, Threats, and Applications
    Kakarountas, Athanasios
    [J]. IEEE Potentials, 2019, 38 (02): : 10 - 11
  • [3] Privacy in the Internet of Things: threats and challenges
    Ziegeldorf, Jan Henrik
    Morchon, Oscar Garcia
    Wehrle, Klaus
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2728 - 2742
  • [4] Internet of Things Applications: Opportunities and Threats
    Rahmani, Amir Masoud
    Bayramov, Suleyman
    Kiani Kalejahi, Behnam
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (01) : 451 - 476
  • [5] Threats in the Internet of Things Pertaining to Digital Data
    ul Arafeen, Qamar
    Kamran, Asif
    ul Arifeen, Najam
    Shaikh, Asad Ali
    Syed, Nadeem A.
    [J]. PROCEEDINGS OF THE THIRTEENTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, VOL 1, 2020, 1001 : 13 - 29
  • [6] Securing the Internet of Things: Challenges, threats and solutions
    Grammatikis, Panagiotis I. Radoglou
    Sarigiannidis, Panagiotis G.
    Moscholios, Ioannis D.
    [J]. INTERNET OF THINGS, 2019, 5 : 41 - 70
  • [7] Threats to Journalists from the Consumer Internet of Things
    Shere, Anjuli R. K.
    Nurse, Jason R. C.
    Martin, Andrew
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 303 - 326
  • [8] Emerging Threats in Internet of Things Voice Services
    Kumar, Deepak
    Paccagnella, Riccardo
    Murley, Paul
    Hennenfent, Eric
    Mason, Joshua
    Bates, Adam
    Bailey, Michael
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (04) : 18 - 24
  • [9] Security Threats and Attacks in Internet of Things (IOTs)
    Almtrafi, Sara Mutlaq
    Alkhudadi, Bdour Abduallatif
    Sami, Gofran
    Alhakami, Wajdi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 107 - 118
  • [10] Security and privacy in the Internet of Things: threats and challenges
    Badr, Youakim
    Zhu, Xiaoyang
    Alraja, Mansour Naser
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) : 257 - 271