IoT Security: A review of vulnerabilities and security protocols

被引:0
|
作者
Varma, Ravi Kiran P. [1 ]
Priyanka, M. [1 ]
Krishna, Vamsi B. S. [1 ]
Raju, Subba K., V [1 ]
机构
[1] MVGR Coll Engn, Dept Comp Sci & Engn, Vizianagaram, Andhra Pradesh, India
关键词
Internet of Things; IoT; Vulnerabilities; Security Issues; Protocols; IoT Security;
D O I
10.26782/jmcms.2019.04.00037
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
Internet of Things (IoT) technology is ubiquitous. In the past decade there was an exponential growth in IoT deployments, so as the potential danger of attacks and threats using IoT devices. The privacy of an individual can be breached and the sensitive information can be disclosed if proper security measures are not in place in the IoT device. A patient monitoring system using an IoT device is vulnerable to many such threats. Even centrifuges and atomic reactors were fallen victim of an industrial security breach caused by popular malware like slammer and Stuxnet. Vehicular and personal gadgets are vulnerable to IoT vulnerabilities that may lead to a leak of information to potential insurance companies and thereby increase of premiums. Our own homes including energy meters, IP cameras, and security monitoring systems may be taken control by hackers if there exist vulnerabilities in the IoT devices. This paper, discusses on IoT vulnerabilities by surveying several sectors of IoT and proposes several security measures that can be implemented to minimize those vulnerabilities.
引用
收藏
页码:509 / 520
页数:12
相关论文
共 50 条
  • [1] IoT Networks: Security Vulnerabilities of Application Layer Protocols
    Lalit, Mohit
    Chawla, Sunil Kumar
    Rana, Arun Kumar
    Nisar, Kashif
    Soomro, Tariq Rahim
    Khan, Muhammad Asghar
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [2] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [3] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [4] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [5] Computing Security Scores for IoT Device Vulnerabilities
    Rizvi, Syed
    McIntyre, Nicholas
    Ryoo, Jungwoo
    [J]. 2019 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2019), 2019, : 52 - 59
  • [6] Security Vulnerabilities in Bluetooth Technology as Used in IoT
    Lonzetta, Angela M.
    Cope, Peter
    Campbell, Joseph
    Mohd, Bassam J.
    Hayajneh, Thaier
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2018, 7 (03):
  • [7] Security of Low Level IoT Protocols
    Gruska, Damas P.
    Ruiz, M. Carmen
    [J]. COMPUTATIONAL SCIENCE - ICCS 2019, PT III, 2019, 11538 : 621 - 633
  • [8] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    [J]. 2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [9] Comparative Analysis of Security Protocols in IoT
    Alazzawi, Saif Saffah Badr
    Siddiqui, Tamanna
    [J]. INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY (ICICCT 2021), 2021, 1417 : 76 - 86
  • [10] IoT: Communication protocols and security threats
    Gerodimos, Apostolos
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Ayres, Nick
    Kantzavelou, Ioanna
    [J]. Internet of Things and Cyber-Physical Systems, 2023, 3 : 1 - 13