Security Threats and Mitigation Approaches in IoT based Applications
DOI:
https://doi.org/10.61841/p0dtbf81Keywords:
Internet of Things, Protocols, Architecture, Security Threats, Healthcare, Home Appliances, Smart PhonesAbstract
The Internet of Things (IoT) as a budding technology has modernized the global network comprising people, smart devices, intelligent objects, information, and data. There is a huge opportunity for IoT to make the world more available, integral, accessible, confidential, interoperable, and scalable. IoT can be exercised in domains such as healthcare, transportation, entertainment, power grids, and smart buildings. IoT is likely to work as a catalyst for future technological innovations, and its use is presumed to grow rapidly. Various devices that we use on a daily basis can connect with each other via the internet; this has been made possible by IoT. There remain security concerns due to the connection of numerous devices to the internet and the massive data associated with it. Protection and integration of heterogeneous smart devices and information communication technologies (ICT) are the significant factors of the paradigm. The security threats that the users face in the environment of IoT and countermeasures to mitigate them are discussed in this paper.
Downloads
References
[1] S. Naik and V. Maral, Cyber security — IoT, 2017 2nd IEEE International Conference on Recent Trends in
Electronics, Information & Communication Technology (RTEICT), Bangalore, pp. 764-767, 2017.
[2] B. Usmonov, A. Iskhakov, A. Shelupanov, A. Iskhakova, and R. Meshcheryakov, The cybersecurity in
development of IoT embedded technologies, Int. Conf. Inf. Sci. Commun. Technol., pp. 1–4, 2017
[3] Annamalai, Lakshmanan and Selvakumar Manickam, A Literature review on cybersecurity in the field of
IoT—Internet of Things, Technical Report, April, 2018.
[4] Yang Lu and Li Da Xu, Internet of Things (IoT) Cybersecurity Research: A Review of Current Research
Topics, IEEE Internet of Things Journal, September 2018
[5] H. He C. Maple T. Watson A. Tiwari J. Mehnen Y. Jin B. Gabrys, The Security Challenges in the IoT
enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other
Computational Intelligence, Evolutionary Computation pp. 1015-1021, 2016
[6] Kebande, Victor R., Nickson M. Karie, Antonia Michael, Semaka MG Malapane, and H. S. Venter, How
an IoT-enabled smart refrigerator can play a clandestine role in perpetuating cyber- cybercrime. IST - Africa
Week Conference (IST-Africa), pp. 1-10. IEEE, 2017.
[7] M.H. Khan M.A. Shah, Survey on Security Threats of Smartphones in Internet of Things, Automation and Computing (ICAC) 22nd International Conference, 2016.
[8] Gupta, Krishna Kanth, and Sapna Shukla. Internet of Things: Security challenges for next-generation networks. International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 315-318. IEEE, 2016.
[9] Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.-S. IoT Elements, Layered Architectures, and Security Issues: A Comprehensive Survey. Sensors 18, 2796. 2018,
[10] Kumar, Sathish Alampalayam, Tyler Vealey, and Harshit Srivastava, Security in Internet of Things:
Challenges, Solutions and Future Directions, IEEE 49th Hawaii International Conference on System
Sciences (HICSS), pp. 5772-5781, 2016
[11] John A. Stankovic, Research Directions for the Internet of Things, IEEE Internet of Things Journal, Vol. 1,
Feb. 2014.
[12] Hi Suo, Jiafu, Caifeng Zoua, Jianqia, and Wan. Security in the Internet of Things—A Review, International
Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 648–651, 2012
[13] Xu Xiaohui. Study on Security Problems and Key Technologies of The Internet of Things, Fifth
International Conference on Computational and Information Sciences (ICCIS)), pp. 407–410, 2013
[14] Sathish J. Kumar and Dhiren R. Patel. Article: A Survey on the Internet of Things: Security and Privacy Issues.
International Journal of Computer Applications 90(11):20-26, March 2014.
[15] K. Fazal, H. Shehzad, A. Tasneem, A. Dawood, Z. Ahmed, A Systematic Literature Review on the Security Challenges of Internet of Things and their Classification, IJTNRR, pp. 40-48, 2017
[16] W. Zhou, Y. Jia, A. Peng, Y. Zhang, P. Liu, The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J. 12, 1–1, 2018.
[17] I. Yaqoob, E. Ahmed, I.A.T. Hashem, A.I.A. Ahmed, A. Gani, M. Imran, and M. Guizani, Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges, IEEE Wireless Communications, vol. 24, no. 3, pp. 10–16, June 2017.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.