Advertisement

Internet of Things: Illuminating and Study of Protection and Justifying Potential Countermeasures

  • Nitesh ChouhanEmail author
  • Hemant Kumar Saini
  • S. C. Jain
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 898)

Abstract

Presently, Internet of things (IoTs) contains environs with explore in innumerable mixed plans are linked by the classes of Internet. That decides the plans in novel capability. Such having a important responsibility in the privacy of informatics. Conservatively, security method would not be directly sensible to IoT knowledge due to the different philosophy and communiqué alarmed. Here crucial study is complete in divulge the safety and solitude with IoT plans and quarrel diverse contradict events alleviate that supply the potential extent for subsequently investigate with IoT coerce.

Keywords

IOT Eavesdrop Sinkhole attack Sniffer MITM CPS IDS IOTCube RFID UNB RC4 

References

  1. 1.
    Arseni, S., Halunga, S., Fratu, O., Vulpe, A., Suciu, G.: Analysis of the security solutions implemented in current Internet of Things platforms. In: 2015 Conference Grid, Cloud & High Performance Computing in Science (ROLCG) (2015)Google Scholar
  2. 2.
    Mosenia, A., Jha, N.: A comprehensive study of security of Internet-of-Things. IEEE Trans. Emerg. Topics Comput. 4, 586–602 (2017)CrossRefGoogle Scholar
  3. 3.
    Okul, S., Ali Aydin, M.: Security attacks on IoT. In: 2017 International Conference on Computer Science and Engineering (UBMK) (2017)Google Scholar
  4. 4.
    Daniel, M.: Hidden dangers of Internet of Things. Women Secur. 69–75 (2017)Google Scholar
  5. 5.
    Haber, M., Hibbert, B.: Internet of Things (IoT). In: Privileged Attack Vectors, pp. 139–142 (2017)Google Scholar
  6. 6.
    Alioto, M., Shahghasemi, M.: The Internet of Things on its edge: trends toward its tipping point. IEEE Consum. Electron. Mag. 7(1), 77–87 (2018)CrossRefGoogle Scholar
  7. 7.
    Jaiswal, S., Gupta, D.: Security requirements for Internet of Things (IoT). Adv. Intel. Syst. Comput. 419–427 (2017)Google Scholar
  8. 8.
    Al-Gburi, A., Al-Hasnawi, A., Lilien, L.: Differentiating security from privacy in Internet of Things: a survey of selected threats and controls. In: Computer and Network Security Essentials, pp. 153–172 (2017)Google Scholar
  9. 9.
    Adat, V., Gupta, B.: Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. (2017)Google Scholar
  10. 10.
    Sain, M., Kang, Y., Lee, H.: Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017)Google Scholar
  11. 11.
    Payne, B., Abegaz, T.: Securing the Internet of Things: best practices for deploying IoT devices. Comput. Netw. Secur. Essent. 493–506 (2017)Google Scholar
  12. 12.
    Dawson, M.: Cyber security policies for hyperconnectivity and Internet of Things: a process for managing connectivity. Adv. Intell. Syst. Comput. 911–914 (2017)Google Scholar
  13. 13.
    Banerjee, M., Lee, J., Choo, K.: A blockchain future to Internet of Things security: a position paper. Dig. Commun. Netw. (2017)Google Scholar
  14. 14.
    Lopes De Faria, M., Cugnasca, C., Amazonas, J.: Insights into IoT data and an innovative DWT-based technique to denoise sensor signals. IEEE Sens. J. 18(1), 237–247 (2018)CrossRefGoogle Scholar
  15. 15.
    Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and Internet-of-Things systems. Proc. IEEE 106(1), 9–20 (2018)CrossRefGoogle Scholar
  16. 16.
    Hong, S., Kim, Y., Kim, G.: Developing usable interface for Internet of Things (IoT) security analysis software. In: Human Aspects of Information Security, Privacy and Trust, pp. 322–328 (2017)CrossRefGoogle Scholar
  17. 17.
    Mohanty, S., Huebner, M., Xue, C., Li, X., Li, H.: Guest editorial circuit and system design automation for Internet of Things. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 3–6 (2018)CrossRefGoogle Scholar
  18. 18.
    Fu, Y., Yan, Z., Cao, J., Koné, O., Cao, X.: An automata based intrusion detection method for Internet of Things. Mob. Inf. Syst. 2017, 1–13 (2017)Google Scholar
  19. 19.
    Dahabiyeh, L.: The security of Internet of Things: current state and future directions. Inf. Syst. 414–420 (2017)Google Scholar
  20. 20.
    Malik, A., Om, H.: Cloud computing and Internet of Things integration: architecture, applications, issues, and challenges. In: Sustainable Cloud and Energy Services, pp. 1–24 (2017)Google Scholar
  21. 21.
    Oppitz, M., Tomsu, P.: Internet of Things. In: Inventing the Cloud Century, pp. 435–469 (2017)Google Scholar
  22. 22.
    Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L.: IoT technologies for smart cities. IET Netw. 7(1), 1–13 (2018)CrossRefGoogle Scholar
  23. 23.
    Shahid, A., Khalid, B., Shaukat, S., Ali, H., Qadri, M.: Internet of Things shaping smart cities: a survey. In: Studies in Big Data, pp. 335–358 (2017)Google Scholar
  24. 24.
    Javdani, H., Kashanian, H.: Internet of Things in medical applications with a service-oriented and security approach: a survey. Health Technol. (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Nitesh Chouhan
    • 1
    Email author
  • Hemant Kumar Saini
    • 2
  • S. C. Jain
    • 3
  1. 1.Department of ITManikya Lal Verma Textile & Engineering CollegeBhilwaraIndia
  2. 2.Department of CSEModern Institute of Technology & Research CenterAlwarIndia
  3. 3.University DepartmentRajasthan Technical UniversityKotaIndia

Personalised recommendations