skip to main content
article

Attacks on Resource-Constrained IoT Devices and Security Solutions

Published: 07 October 2022 Publication History

Abstract

An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.

References

[1]
Abdulkader, O., Bamhdi, A. M., Thayananthan, V., Elbouraey, F., & Al-Ghamdi, B. (2019). A Lightweight Blockchain Based Cybersecurity for IoT environments. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 139–144. 10.1109/CSCloud/EdgeCom.2019.000-5
[2]
Abomhara, M., & Koien, G. M. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security and Mobility, 4(1), 65–88.
[3]
Ahmad, R., & Alsmadi, I. (2021). Machine learning approaches to IoT security: A systematic literature review. Internet of Things, 14, 100365.
[4]
Ahmed, A. I. A., Ab Hamid, S. H., Gani, A., khan, S., & Khan, M. K. (2019). Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications, 145, 102409.
[5]
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–2376.
[6]
al Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN). Computers, 9(1), 8.
[7]
AndreaI.ChrysostomouC.HadjichristofiG. (2015). Internet of Things: Security vulnerabilities and challenges. 2015 IEEE Symposium on Computers and Communication (ISCC), 2016-February, 180–187. 10.1109/ISCC.2015.7405513
[8]
Ashraf, Q. M., & Habaebi, M. H. (2015). Autonomic schemes for threat mitigation in Internet of Things. Journal of Network and Computer Applications, 49, 112–127.
[9]
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.
[10]
Aydos, M., Vural, Y., & Tekerek, A. (2019). Assessing risks and threats with layered approach to Internet of Things security. Measurement and Control, 52(5–6), 338–353.
[11]
Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., & Attia, R. (2018). PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks, 133, 141–156.
[12]
Bull, P., Austin, R., Popov, E., Sharma, M., & Watson, R. (2016). Flow Based Security for IoT Devices Using an SDN Gateway. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 157–163. 10.1109/FiCloud.2016.30
[13]
Burhan, M., Rehman, R., Khan, B., & Kim, B.-S. (2018). IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors (Basel), 18(9), 2796. 30149582.
[14]
Butun, I., Osterberg, P., & Song, H. (2020). Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Communications Surveys and Tutorials, 22(1), 616–644.
[15]
Chaudhary, P., & Gupta, B. B. (2019). DDoS detection framework in resource constrained internet of things domain. 2019 IEEE 8th Global Conference on Consumer Electronics, GCCE 2019, 675–678. 10.1109/GCCE46687.2019.9015465
[16]
Cisco. (2020). Cisco Annual Internet Report - Cisco Annual Internet Report (2018–2023) White Paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[17]
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.
[18]
DeogirikarJ.VidhateA. (2017). Security attacks in IoT: A survey. Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017, 32–37. 10.1109/I-SMAC.2017.8058363
[19]
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180–197.
[20]
Fadele, A. A., Othman, M., Hashem, I. A. T., Yaqoob, I., Imran, M., & Shoaib, M. (2019). A novel countermeasure technique for reactive jamming attack in internet of things. Multimedia Tools and Applications, 78(21), 29899–29920.
[21]
Ferrag, M. A., Maglaras, L., Ahmim, A., Derdour, M., & Janicke, H. (2020). RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet, 12(3), 44.
[22]
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, 1–41.
[23]
Flauzac, O., Gonzalez, C., Hachani, A., & Nolot, F. (2015). SDN Based Architecture for IoT and Improvement of the Security. Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2015, 688–693. 10.1109/WAINA.2015.110
[24]
Gaurav, A., Psannis, K., & Peraković, D. (2022). Security of cloud-based medical internet of things (miots): A survey. International Journal of Software Science and Computational Intelligence, 14(1), 1–16.
[25]
Ghafir, I., Prenosil, V., Alhejailan, A., & Hammoudeh, M. (2016). Social engineering attack strategies and defence approaches. Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, 145–149. 10.1109/FiCloud.2016.28
[26]
Ghasemi, M., Saadaat, M., & Ghollasi, O. (2019). Threats of Social Engineering Attacks Against Security of Internet of Things (IoT). In Lecture Notes in Electrical Engineering (Vol. 480, pp. 957–968). Springer.
[27]
Hashimoto, N., Ozawa, S., Ban, T., Nakazato, J., & Shimamura, J. (2018). A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning. Procedia Computer Science, 144, 118–123.
[28]
Ioannou, C., & Vassiliou, V. (2019). Classifying security attacks in IoT networks using supervised learning. Proceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019, 652–658. 10.1109/DCOSS.2019.00118
[29]
Jan, M. A., Khan, F., Alam, M., & Usman, M. (2019). A payload-based mutual authentication scheme for Internet of Things. Future Generation Computer Systems, 92, 1028–1039.
[30]
Karthik, M. G., & Krishnan, M. B. M. (2021). Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks. Journal of Ambient Intelligence and Humanized Computing, 1, 1–11.
[31]
Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
[32]
Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012). Future internet: The internet of things architecture, possible applications and key challenges. Proceedings - 10th International Conference on Frontiers of Information Technology, FIT 2012, 257–260. 10.1109/FIT.2012.53
[33]
Kirbas, I. (2015). Developing and Remote Controlling a Multi-Zone Cooling Plant using Web Services and a Secure Token Mechanism. Measurement and Control, 48(9), 278–284.
[34]
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.
[35]
le Zhong, C., Zhu, Z., & Huang, R. G. (2016). Study on the IOT architecture and gateway technology. Proceedings - 14th International Symposium on Distributed Computing and Applications for Business, Engineering and Science, DCABES 2015, 196–199. 10.1109/DCABES.2015.56
[36]
LeoM.BattistiF.CarliM.NeriA. (2014). A federated architecture approach for Internet of Things security. 2014 Euro Med Telco Conference (EMTC), 1–5. 10.1109/EMTC.2014.6996632
[37]
Liang, L., Zheng, K., Sheng, Q., & Huang, X. (2017). A denial of service attack method for an IoT system. Proceedings - 2016 8th International Conference on Information Technology in Medicine and Education, ITME 2016, 360–364. 10.1109/ITME.2016.0087
[38]
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet of Things Journal, 4(5), 1125–1142.
[39]
Liu, X., Du, X., Zhang, X., Zhu, Q., Wang, H., & Guizani, M. (2019). Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors (Basel), 19(4), 974. 30823597.
[40]
Mahjabin, T., Xiao, Y., Sun, G., & Jiang, W. (2017). A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks, 13(12).
[41]
Man in the Middle Attack information from the UK Cyber Security Association. (2021). https://cybersecurityassociation.co.uk/common-attacks/man-in-the-middle-attack-advice/
[42]
Manimurugan, S. (2021). IoT-Fog-Cloud model for anomaly detection using improved Naïve Bayes and principal component analysis. Journal of Ambient Intelligence and Humanized Computing, 1, 1–10.
[43]
Mao, J., Zhu, H., Liu, Y., Liu, Y., Qian, W., Zhang, J., & Huang, X. (2018). RSA-Based Handshake Protocol in Internet of Things. Proceedings - 9th International Conference on Information Technology in Medicine and Education, ITME 2018, 989–993. 10.1109/ITME.2018.00220
[44]
Memos, V. A., Psannis, K. E., Ishibashi, Y., Kim, B. G., & Gupta, B. B. (2018). An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework. Future Generation Computer Systems, 83, 619–628.
[45]
Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet of Things Journal, 6(5), 8182–8201.
[46]
Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2019). Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet of Things Journal, 6(1), 379–387.
[47]
Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S. K., & Khanna, A. (2020). An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, 1027–1037.
[48]
Morfino, V., & Rampone, S. (2020). Towards Near-Real-Time Intrusion Detection for IoT Devices using Supervised Learning and Apache Spark. Electronics (Basel), 9(3), 444.
[49]
Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Improving the security of internet of things using cryptographic algorithms: A case of smart irrigation systems. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2033–2051.
[50]
Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors (Basel), 20(13), 3625. 32605178.
[51]
Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2017). Internet of Things (IoT): Taxonomy of security attacks. 2016 3rd International Conference on Electronic Design, ICED 2016, 321–326. 10.1109/ICED.2016.7804660
[52]
Ozawa, S., Ban, T., Hashimoto, N., Nakazato, J., & Shimamura, J. (2020). A study of IoT malware activities using association rule learning for darknet sensor data. International Journal of Information Security, 19(1), 83–92.
[53]
Pokhrel, S., Abbas, R., & Aryal, B. (2021). IoT Security: Botnet detection in IoT using Machine learning. https://arxiv.org/abs/2104.02231
[54]
RajanA.JithishJ.SankaranS. (2017). Sybil attack in IOT: Modelling and defenses. 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2323–2327. 10.1109/ICACCI.2017.8126193
[55]
Restuccia, F., D’Oro, S., & Melodia, T. (2018). Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking. IEEE Internet of Things Journal, 5(6), 4829–4842.
[56]
Roldán, J., Boubeta-Puig, J., Luis Martínez, J., & Ortiz, G. (2020). Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Systems with Applications, 149, 113251.
[57]
RonenE.ShamirA. (2016). Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 3–12. 10.1109/EuroSP.2016.13
[58]
Rostampour, S., Safkhani, M., Bendavid, Y., & Bagheri, N. (2020). ECCbAP: A secure ECC-based authentication protocol for IoT edge devices. Pervasive and Mobile Computing, 67, 101194.
[59]
Salahdine, F., & Kaabouch, N. (2019). Social Engineering Attacks: A Survey. Future Internet, 11(4), 89.
[60]
Sejdiu, B., Ismaili, F., & Ahmedi, L. (2020). Integration of semantics into sensor data for the IoT: A systematic literature review. International Journal on Semantic Web and Information Systems, 16(4), 1–25.
[61]
Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, 1–25.
[62]
Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios. IEEE Access: Practical Innovations, Open Solutions, 8, 23022–23040.
[63]
Si, H., Sun, C., Li, Y., Qiao, H., & Shi, L. (2019). IoT information sharing security mechanism based on blockchain technology. Future Generation Computer Systems, 101, 1028–1040.
[64]
Sidhu, S., Mohd, B. J., & Hayajneh, T. (2019). Hardware Security in IoT Devices with Emphasis on Hardware Trojans. Journal of Sensor and Actuator Networks, 8(3), 42.
[65]
SnaderR.KravetsR.HarrisA. F. (2016). CryptoCoP: Lightweight, Energy-efficient Encryption and Privacy for Wearable Devices. Proceedings of the 2016 Workshop on Wearable Systems and Applications - WearSys ’16, 7–12. 10.1145/2935643.2935647
[66]
Swan, M. (2012). Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0. Journal of Sensor and Actuator Networks, 1(3), 217–253.
[67]
Symantec Security Center. (2021). https://www.broadcom.com/support/security-center
[68]
Taghavinejad, S. M., Taghavinejad, M., Shahmiri, L., Zavvar, M., & Zavvar, M. H. (2020). Intrusion Detection in IoT-Based Smart Grid Using Hybrid Decision Tree. 2020 6th International Conference on Web Research (ICWR), 152–156. 10.1109/ICWR49608.2020.9122320
[69]
Tahsien, S. M., Karimipour, H., & Spachos, P. (2020). Machine learning based solutions for security of Internet of Things (IoT): A survey. Journal of Network and Computer Applications, 161, 102630.
[70]
Tan, L., & Wang, N. (2010). Future internet: The Internet of Things. 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 5, 376-380. 10.1109/ICACTE.2010.5579543
[71]
Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems, 108, 909–920.
[72]
Thakkar, A., & Lohiya, R. (2021). A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges. Archives of Computational Methods in Engineering, 28(4), 3211–3243.
[73]
Thirumalai, C., Mohan, S., & Srivastava, G. (2020). An efficient public key secure scheme for cloud and IoT security. Computer Communications, 150, 634–643.
[74]
Tsogbaatar, E., Bhuyan, M. H., Taenaka, Y., Fall, D., Gonchigsumlaa, K., Elmroth, E., & Kadobayashi, Y. (2020). SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. In IFIP Advances in Information and Communication Technology: Vol. 584 (pp. 268–280). Springer.
[75]
Tukur, Y. M., & Ali, Y. S. (2019). Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems. 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), 1–6. 10.1109/ICECCO48375.2019.9043248
[76]
Varga, P., Plosz, S., Soos, G., & Hegedus, C. (2017). Security threats and issues in automation IoT. 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), 1–6. 10.1109/WFCS.2017.7991968
[77]
VashiS.RamJ.ModiJ.VermaS.PrakashC. (2017). Internet of Things (IoT): A vision, architectural elements, and security issues. Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017, 492–496. 10.1109/I-SMAC.2017.8058399
[78]
Venkatraman & Overmars. (2019). New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptography, 3(3), 20. 10.3390/cryptography3030020
[79]
Verma, A., & Ranga, V. (2020). Machine Learning Based Intrusion Detection Systems for IoT Applications. Wireless Personal Communications, 111(4), 2287–2310.
[80]
Wu, M., Lu, T. J., Ling, F. Y., Sun, J., & Du, H. Y. (2010). Research on the architecture of Internet of Things. ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings, 5. 10.1109/ICACTE.2010.5579493
[81]
Xu, S., Yang, G., Mu, Y., & Liu, X. (2019). A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Generation Computer Systems, 97, 284–294.
[82]
YanW.FuA.MuY.ZheX.YuS.KuangB. (2019). EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices. IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 19, 2–7. 10.1145/3338507.3358614
[83]
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.
[84]
Yashiro, T., Kobayashi, S., Koshizuka, N., & Sakamura, K. (2013). An Internet of Things (IoT) architecture for embedded appliances. 2013 IEEE Region 10 Humanitarian Technology Conference, R10-HTC 2013, 314–319. 10.1109/R10-HTC.2013.6669062
[85]
Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A. (2017). Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1), 88–95.

Cited By

View all

Index Terms

  1. Attacks on Resource-Constrained IoT Devices and Security Solutions
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image International Journal of Software Science and Computational Intelligence
          International Journal of Software Science and Computational Intelligence  Volume 14, Issue 1
          Oct 2022
          1068 pages
          ISSN:1942-9045
          EISSN:1942-9037
          Issue’s Table of Contents

          Publisher

          IGI Global

          United States

          Publication History

          Published: 07 October 2022

          Author Tags

          1. Attacks
          2. Blockchain
          3. Cryptography
          4. DDoS
          5. IoT
          6. Machine Learning
          7. Security
          8. Software-Defined Network

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 09 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media