This page has only limited features, please log in for full access.
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications.
Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors 2021, 21, 1809 .
AMA StyleParushi Malhotra, Yashwant Singh, Pooja Anand, Deep Bangotra, Pradeep Singh, Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors. 2021; 21 (5):1809.
Chicago/Turabian StyleParushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. 2021. "Internet of Things: Evolution, Concerns and Security Challenges." Sensors 21, no. 5: 1809.
Iot being a transformative approach for imparting countless services raises consequential security flaws as well. These flaws germinate from the embedded vulnerabilities in IoT devices. The market is flooded with these vulnerable smart devices, which are easy to play with to remotely enter into an IoT system. This becomes more serious as communication protocols and Internet technologies were not devised to support IoT. In this paper, we mainly focus on the evolving vulnerabilities in IoT that can affect its sustenance in the long run. We also elaborated on the remediation strategies to be incorporated to lessen the fertility of the ground to launch numerous attacks. Finally, we conclude with the challenges and recommendations.
Pooja Anand; Yashwant Singh; Arvind Selwal. Internet of Things (IoT): Vulnerabilities and Remediation Strategies. Lecture Notes in Electrical Engineering 2021, 265 -273.
AMA StylePooja Anand, Yashwant Singh, Arvind Selwal. Internet of Things (IoT): Vulnerabilities and Remediation Strategies. Lecture Notes in Electrical Engineering. 2021; ():265-273.
Chicago/Turabian StylePooja Anand; Yashwant Singh; Arvind Selwal. 2021. "Internet of Things (IoT): Vulnerabilities and Remediation Strategies." Lecture Notes in Electrical Engineering , no. : 265-273.
In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common IoT devices and proposes a threat architecture for IoT, addressing threats in the context of a three-layer IoT reference architecture. Furthermore, the vulnerabilities exploited at the several IoT attack surfaces and the challenges they exert are explored. Thereafter, the challenges in quantifying the IoT vulnerabilities with the existing framework are also analyzed. The study also covers a case study on the Intelligent Transportation System, covering road transport and traffic control specifically in terms of threats and vulnerabilities. Another case study on secure energy management in the Smart Grid is also presented. This case study covers the applications of Internet of Vulnerable Things (IoVT) in Smart energy Grid solutions, as there will be tremendous use of IoT in future Smart Grids to save energy and improve overall distribution. The analysis shows that the integration of the proposed architecture in existing applications alarms the developers about the embedded threats in the system.
Pooja Anand; Yashwant Singh; Arvind Selwal; Pradeep Singh; Raluca Felseghi; Maria Raboaca. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies 2020, 13, 4813 .
AMA StylePooja Anand, Yashwant Singh, Arvind Selwal, Pradeep Singh, Raluca Felseghi, Maria Raboaca. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies. 2020; 13 (18):4813.
Chicago/Turabian StylePooja Anand; Yashwant Singh; Arvind Selwal; Pradeep Singh; Raluca Felseghi; Maria Raboaca. 2020. "IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids." Energies 13, no. 18: 4813.
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving security issues in IoT systems and make them self-sufficient to harvest energy for smooth functioning. Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. Moreover, we provide a general overview of IoT, Sustainable IoT, its architecture, and the Internet Engineering Task Force (IETF) protocol suite. Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. Then we have specifically focused on the IoT Vulnerability Assessment techniques followed by a case study on sustainability of Smart Agriculture. Finally, this paper outlines the emerging challenges related to IoT and its sustainability, and opening the doors for the beginners to start research in this promising area.
Pooja Anand; Yashwant Singh; Arvind Selwal; Mamoun Alazab; Sudeep Tanwar; Neeraj Kumar. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. IEEE Access 2020, 8, 168825 -168853.
AMA StylePooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. IEEE Access. 2020; 8 (99):168825-168853.
Chicago/Turabian StylePooja Anand; Yashwant Singh; Arvind Selwal; Mamoun Alazab; Sudeep Tanwar; Neeraj Kumar. 2020. "IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges." IEEE Access 8, no. 99: 168825-168853.