Abstract
Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuationcapabilities, working collaboratively to provide a specific functionality. IoT applications are becoming vital part ofour daily lives in various areas such as home automation, industrial automation, energy sector, healthcare sectorand smart transportation. Security is a term that is used to encompass the notions such as integrity, confidentiality,and privacy. A more prominent understanding of the Internet of Things (IoT) is that – it transmits data over theglobal internet and gives many services in many domains. It facilitates the machines and gadgets to communicatewith each other. IoT appliances have been facing several issues, therefore we identify variety of service domainsand their vulnerabilities. The main focus is on protecting the security and privacy. This paper presents anoverview of IoT models, applications in different domains, vulnerabilities, security privacy goals, possible attacks,and their corresponding countermeasures. The objective of this paper is also to provide a survey on categorizedlayer-wise attacks and countermeasures in detail. In the object layer, connectivity link Layer, several attacksare discussed based on RFID, NFC, ZigBee, Bluetooth, and Wi-Fi protocols. In the Transport Network layer,we have classified variety of attacks based on RPL, 6loWPAN, TCP/UDP, and IPv4/IPv6. Similarly, In theSession Communication, Data Aggregation Storage, Business Model, and Application layers, we have discoveredconsiderable number of attacks for each layer.
Publisher
Perpetual Innovation Media Pvt. Ltd.
Reference118 articles.
1. https://www.sans.org/reading-room/whitepapers/detection/paper/33904.
2. https://tanguy.ortolo.eu/blog/article69/xmpploit-explained.
3. Abad, C. L. and Bonilla, R. I. 2007. An analysis on the schemes for detecting and preventing arp cache poisoning attacks. In 27th International Conference on Distributed Computing Systems Workshops (ICDCSW’07). IEEE, 60–60.
4. Abare, G. and Garba, E. 2019. A proposed model for enhanced security against key reinstal- lation attack on wireless networks. International Journal of Scientific Research in Network Security and Communication 7, 3, 21–27.
5. AbdAllah, E. G., Hassanein, H. S., and Zulkernine, M. 2015. A survey of security attacks in information-centric networking. IEEE Communications Surveys & Tutorials 17, 3, 1441– 1454.