Security Study of Different Threats in Internet of Things

  • Imane SahmiEmail author
  • Tomader Mazri
  • Nabil Hmina
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)


The Internet of Things becomes a concept that will be used by everyone, anytime and everywhere in the upcoming years. Internet of Things will foster billion of devices, people and services to interconnect and exchange information and sensitive data. That’s why securing the communication through IoT is one of the greatest challenges faced by the scientist’s community today in their recent research’s. Therefore, it can be safely commercialized. This paper discusses the different security threats and vulnerabilities according to these three components: security threats on data and network, security threats on privacy and security threats on system and IoT through a review of the available literature. This study includes also a state of the art survey about the various physical attacks, network attacks and software ones. Finally, we will try to contribute by some recommendations and open research that should be done to improve the security of Internet of Things.


Security Internet of things Threats 


  1. 1.
    Ahamed, J., Rajan, A.V.: Internet of Things (IoT): Application Systems and Security Vulnerabilities (2016)Google Scholar
  2. 2.
    Ashton, K.L.: That Internet of Things Thing. Disponible sur: net%20of%20Things%20Thing.pdf
  3. 3.
    Vermesan, O., Friess, P.: Internet of things: converging technologies for smart environments and integrated ecosystems. (2013)Google Scholar
  4. 4.
    Yan , L. (ed.): The internet of things: from RFID to the next-generation pervasive networked systems. New York: Auerbach Publ, (2008)Google Scholar
  5. 5.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. (2010)Google Scholar
  6. 6.
    Ishaq, I et al.:  IETF Standardization in the field of the internet of things (IoT): A survey. J. Sens. Actuator Netw. 2(4) 235–287, (2013)CrossRefGoogle Scholar
  7. 7.
    Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdfsGoogle Scholar
  8. 8.
    Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things (2015)Google Scholar
  9. 9.
    Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security Vulnerabilities and Challenges (2015)Google Scholar
  10. 10.
    Li, L.: Study on security architecture in the Internet of Things. In: 2012 International Conference on Measurement, Information and Control (MIC), vol. 1, pp. 374–377 (2012)Google Scholar
  11. 11.
    Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 11(4), 42–56 (2009)CrossRefGoogle Scholar
  12. 12.
    Khoo, B.: RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, pp. 709–712 (2011)Google Scholar
  13. 13.
    Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks, Gen. 15693, 14443 (2010)Google Scholar
  14. 14.
    Uttarkar, R., Kulkarni, R.: Internet of things: architecture and security. Int. J. Comput. Appl. 3, 12–19 (2014)Google Scholar
  15. 15.
    Padhy, R.P., Patra, M.R., Satapathy, S.C.: Cloud Computing: Security Issues and Research Challenges. IEEE, Piscataway, NJ (2008)Google Scholar
  16. 16.
    Wu, D., Hu, G., Ni, G.: Research and improve on secure routing protocols in wireless sensor networks. In: 4th IEEE International Conference on Circuits and Systems for Communications, ICCSC 2008 .pp. 853–856 (2008)Google Scholar
  17. 17.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing In Sensor Networks, pp. 259–268 (2004)Google Scholar
  18. 18.
    Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 32–37 (2017)Google Scholar
  19. 19.
    Babar, S., Mahalle, P., Stango, A, Prasad, N., Prasad, R.: Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) (2010)Google Scholar
  20. 20.
    Open Web Application Security Project: Top 10 IoT Vulnerabilities Project (2014)Google Scholar
  21. 21.
    Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Commun. ACM. 50(10), (2007)CrossRefGoogle Scholar
  22. 22.
    Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the ip-based internet of things. Wirel. Pers. Commun. 61(3), 527–542 (2011)CrossRefGoogle Scholar
  23. 23.
    Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 1–6 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Electrical Systems and Telecommunications Engineering Laboratory, ENSAKIbn Tofail UniversityKenitra, RabatMorocco
  2. 2.System Engineering Laboratory, ENSAKIbn Tofail UniversityKenitra, RabatMorocco

Personalised recommendations