IoT Security: A review of vulnerabilities and security protocols

被引:0
|
作者
Varma, Ravi Kiran P. [1 ]
Priyanka, M. [1 ]
Krishna, Vamsi B. S. [1 ]
Raju, Subba K., V [1 ]
机构
[1] MVGR Coll Engn, Dept Comp Sci & Engn, Vizianagaram, Andhra Pradesh, India
关键词
Internet of Things; IoT; Vulnerabilities; Security Issues; Protocols; IoT Security;
D O I
10.26782/jmcms.2019.04.00037
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
Internet of Things (IoT) technology is ubiquitous. In the past decade there was an exponential growth in IoT deployments, so as the potential danger of attacks and threats using IoT devices. The privacy of an individual can be breached and the sensitive information can be disclosed if proper security measures are not in place in the IoT device. A patient monitoring system using an IoT device is vulnerable to many such threats. Even centrifuges and atomic reactors were fallen victim of an industrial security breach caused by popular malware like slammer and Stuxnet. Vehicular and personal gadgets are vulnerable to IoT vulnerabilities that may lead to a leak of information to potential insurance companies and thereby increase of premiums. Our own homes including energy meters, IP cameras, and security monitoring systems may be taken control by hackers if there exist vulnerabilities in the IoT devices. This paper, discusses on IoT vulnerabilities by surveying several sectors of IoT and proposes several security measures that can be implemented to minimize those vulnerabilities.
引用
收藏
页码:509 / 520
页数:12
相关论文
共 50 条
  • [21] Modelling an IoT Testbed in Context with the Security Vulnerabilities of South Africa
    Nair, Kishor Krishnan
    Dube, Erick
    Lefophane, Samuel
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 244 - 248
  • [22] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    [J]. ENERGIES, 2021, 14 (10)
  • [23] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
    Sun, Pengfei
    Garcia, Luis
    Salles-Loustau, Gabriel
    Zonouz, Saman
    [J]. 2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 373 - 384
  • [24] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment
    Tyagi, Himani
    Kumar, Rajendra
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
  • [25] Security Analysis of Existing IoT Key Management Protocols
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    [J]. 2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [26] Security of IoT Application Layer Protocols: Challenges and Findings
    Nebbione, Giuseppe
    Calzarossa, Maria Carla
    [J]. FUTURE INTERNET, 2020, 12 (03):
  • [27] Impact of Duty Cycle Protocols on Security Cost of IoT
    Alharby, Sultan
    Harris, Nick
    Weddell, Alex
    Reeve, Jeff
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2018, : 25 - 30
  • [28] A REVIEW OF DIFFERENT VULNERABILITIES OF SECURITY IN A LAYERED NETWORK
    Gupta, Pankaj Kumar
    Mittal, Shweta
    Consul, Prakhar
    Jindal, Jitendra Kumar
    [J]. ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2020, 20 (02): : 227 - 236
  • [29] No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases
    Zhang, Nan
    O'Neill, Liam
    Das, Gautam
    Cheng, Xiuzhen
    Huang, Heng
    [J]. INTERNATIONAL JOURNAL OF HEALTHCARE INFORMATION SYSTEMS AND INFORMATICS, 2012, 7 (04) : 48 - 58
  • [30] Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols
    Cao, Zhen
    Guan, Zhi
    Chen, Zhong
    Hu, Jian-Bin
    Tang, Li-Yong
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (02) : 375 - 387