Abstract
In the present scenario, the significance of the Internet of Things (IoT) in different application domains is not easy to avoid. Human beings are receiving services very effectively and efficiently from the IoT in smart decision-making through machine-to-machine (M2M) communication from different locations. The IoT field sensors play an essential function in sensing the smart object/things and making an impact decision. The IoT applications are very much demanding in all the sectors. But until now, all the privacy and security attributes for IoT applications are not adequately implemented. Due to the use of unsecured applications, users may face different types of difficulties and can even face life-threatening situations. Thus, implementation of privacy and security for IoT applications is one of the major concerns of the researchers. In this paper, we discuss about the risks and the threats of IoT. There are different security techniques in the TCP/IP network model, but they are not perfectly suitable in IoT architecture. Therefore, to explain this, we provide a layer-wise comparison of the different technologies or protocols used in the TCP/IP network model and IoT architecture. Here, we emphasize that the security solution based on Internet protocol is not sufficient for IoT enabled applications. Here, we will also discuss different threats and attacks at different layers of IoT stack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac, “Internet of things: vision, applications and research challenges.” Ad hoc Networks. 10(7), 1497–1516 (2012)
H. Derhamy, J. Eliasson, J. Delsing, P. Priller, “A survey of commercial frameworks for the internet of things,” in 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), IEEE, 2015, pp. 1–8
L. Columbus, “charts that will challenge your perspective of IoT’s growth.” Forbes. June 6 (10), 2018
V. Rossi, F. Salinari, Stefano Poni, Tito Caffi, Tiziano Bettati, Addressing the implementation problem in agricultural decision support systems: the example of vite. net®. Comput. Electron. Agric. 100, 88–99 (2014)
A. Jacobsson, P. Davidsson, “Towards a model of privacy and security for smart homes, “ in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), IEEE, 2015, pp. 727–732
G. Leroy, H. Chen, T.C. Rindflesch, Smart and connected health [Guest editors’ introduction]. IEEE Intell. Syst. 29(3), 2–5 (2014)
K. Mahmood, S.A. Chaudhry, H. Naqvi, T. Shon, H.F. Ahmad, “A lightweight message authentication scheme for Smart Grid communications in power sector.” Comput. Electr. Eng. 52, 114–124 (2016)
A. Al-Dweik, R. Muresan, M. Mayhew, M. Lieberman, “IoT-based multifunctional scalable real-time enhanced road side unit for intelligent transportation systems,” in 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE, 2017, pp. 1–6
F.A. Alaba, M. Othman, I.A.T. Hashem, F. Alotaibi, “Internet of Things security: a survey.” J. Network Comput. Appl. 88, 10–28, (2017)
H. Suo, J. Wan, C. Zou, J. Liu, “Security in the internet of things: a review,” in 2012 International Conference on Computer Science and Electronics Engineering, vol 3, IEEE, 2012, pp. 648–651
P. Pongle, G. Chavan, “A survey: attacks on RPL and 6LoWPAN in IoT,” in 2015 International Conference on Pervasive Computing (ICPC), IEEE, 2015, pp. 1–6
Z. Shelby, K. Hartke, C. Bormann, “The constrained application protocol (CoAP).” (2014)
D. Locke, “Mq telemetry transport (mqtt) v3. 1 protocol specification.” IBM developerWorks Technical Library 15 (2010)
P. Saint-Andre, “Extensible messaging and presence protocol (XMPP): Core.” (2004)
S. Vinoski, Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87–89 (2006)
M. Ammar, G. Russello, B. Crispo, Internet of things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8–27 (2018)
M. Nawir, A. Amir, N. Yaakob, O.B. Lynn, “Internet of Things (IoT): taxonomy of security attacks,” in 2016 3rd International Conference on Electronic Design (ICED), IEEE, 2016, pp. 321–326
S.F. Bahari, “Security of wireless sensor networks in the presence of captured nodes.” Ph.D. diss., 2008
R. Bahrampour, R.E. Atani, Y. Deldjoo, “A survey of node capture attacks in wireless sensor networks”
M.H. Yılmaz, H. Arslan, “A survey: spoofing attacks in physical layer security,” in 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), IEEE, 2015, pp. 812–817
Engin Leloglu, A review of security concerns in Internet of Things. J. of Comput. Commun. 5(1), 121–136 (2016)
L. Wallgren, S. Raza, T. Voigt, Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)
F.A. Alaba, M. Othman, I.A.T. Hashem, F. Alotaibi, Internet of Things security: a survey. J. Network Comput. Appl. 88, 10–28 (2017)
I.U. Din, M. Guizani, B.S. Kim, S. Hassan, M.K. Khan, Trust management techniques for the Internet of Things: a survey. IEEE Access 7, 29763–29787 (2018)
V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)
Ivan Farris, Tarik Taleb, Yacine Khettab, Jaeseung Song, A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tutorials 21(1), 812–837 (2018)
S. Zeadally, M. Tsikerdekis, Securing Internet of Things (IoT) with machine learning. Int. J. Commun Syst 33(1), e4169 (2020)
P. Lv, L. Wang, H. Zhu, W. Deng, G. Lize, An IoT-oriented privacy-preserving publish/subscribe model over blockchains. IEEE Access 7, 41309–41314 (2019)
Y. Yu, Y. Li, J. Tian, Jianwei Liu, Blockchain-based solutions to security and privacy issues in the Internet of Things. IEEE Wireless Commun. 25(6), 12–18 (2018)
Y. Jararweh, S. Otoum, A.I. Ridhawi, “Trustworthy and sustainable smart city services at the edge.” Sustain. Cities Soc., p. 102394, (2020)
W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. ur Rasool, W. Dou, “Complementing IoT services through software defined networking and edge computing: a comprehensive survey.” IEEE Commun. Surv. Tutorials (2020)
J. Kharel, H.T. Reda, S.Y. Shin, Fog computing-based smart health monitoring system deploying lora wireless communication. IETE Tech. Rev. 36(1), 69–82 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Panja, S., Chattopadhyay, A.K., Nag, A. (2021). A Review of Risks and Threats on IoT Layers. In: Balas, V.E., Hassanien, A.E., Chakrabarti, S., Mandal, L. (eds) Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing. Lecture Notes on Data Engineering and Communications Technologies, vol 62. Springer, Singapore. https://doi.org/10.1007/978-981-33-4968-1_57
Download citation
DOI: https://doi.org/10.1007/978-981-33-4968-1_57
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4967-4
Online ISBN: 978-981-33-4968-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)