Abstract
The Internet of Things (IoT) offers new and stimulating potential results in various pieces of the overall population, and in the zone of business, various associations and adventures could benefit by accepting the IoT and facilitate it into customary undertakings or things and organizations. These days, generally all contraptions are interconnected to each other by methods for frameworks. There are diverse contraptions are in homes, working environments, vehicles and creation plants and they run distinctive errands to help with step by step endeavors. The amount of related devices is extending all the time since manufactures present every day new web related contraptions for helping the customers of these devices in their customary day by day presence and making new propelled experiences. Internets of Things (IoT) devices are rapidly getting the opportunity to be general while IoT organizations are getting the opportunity to be inevitable. Their success has not gone unnoticed and the amount of threats and ambushes against IoT contraptions and organizations are on the extension too. Advanced ambushes are not new to IoT, but instead as IoT will be significantly weaved in our lives and social requests, it is getting the opportunity to be imperative to wander up and consider computerized obstruction essential. The objective of the area is to focus on computerized security perspective on the earth and contraptions of the Internet of Things. The amount of IoT contraptions is growing continually and these devices are used fundamentally in each part of standard every day presence. As such, mooring the IoT contraptions is expanding progressively more hugeness.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20–26 (2014)
Stango, A., Prasad, N.R., Kyriazanos, D.M.: A threat analysis methodology for security evaluation and enhancement planning. In: SECURWARE’09. Third International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE, pp. 262–267 (2009)
Jiang, D., ShiWei, C.: A study of information security for M2M of IoT. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 3. IEEE, 2010, pp. V3–576
Duncan, J., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 857–862 (2012)
Li, F., Lai, A., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 2011 6th International Conference on Malicious and Unwanted Software (MALWARE), IEEE, pp. 102–109 (2011)
Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, Hoboken (2011)
Rainer, R.K., Cegielski, C.G.: Introduction to Information Systems: Enabling and Transforming Business. Wiley, Hoboken (2010)
Baybutt, P.: Assessing risks from threats to process plants: Threat and vulnerability analysis. Process Saf. Prog. 21(4), 269–275 (2002)
De Vivo, M., Carrasco, E., Isern, G., de Vivo, G.O.: A review of port scanning techniques. ACM SIGCOMM Comput. Commun. Rev. 29(2), 41–48 (1999)
Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)
Kizza, J.M.: Guide to Computer Network Security. Springer, Berlin (2013)
Taneja, M.: An analytics framework to detect compromised IoT devices using mobility behavior. In: 2013 International Conference on ICT Convergence (ICTC). IEEE, pp. 38–43 (2013)
Prasad, N.R.: Threat model framework and methodology for personal networks (PNs). In: 2nd International Conference on Communication Systems Software and Middleware, 2007. COMSWARE 2007. IEEE, pp. 1–6 (2007)
De, S., Barnaghi, P., Bauer, M., Meissner, S.: Service modelling for the internet of things. In: 2011 Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE, pp. 949–955 (2011)
Xiao, G., Guo, J., Xu, L., Gong, Z.: User interoperability with heterogeneous IoT devices through transformation (2014)
Ansari, S., Rajeev, S., Chandrashekar, H.: Packet sniffing: a brief introduction. Potentials, IEEE 21(5), 17–19 (2002)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Hongsong, C., Zhongchuan, F., Dongyan, Z.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES). IEEE, pp. 286–290 (2011)
Koien, G.M., Oleshchuk, V.A.: Aspects of Personal Privacy in Communications-Problems. River Publishers, Technology and Solutions (2013)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s intranet of things to a future internet of things: a wireless-and mobility-related view. Wirel. Commun. IEEE 17(6), 44–51 (2010)
Cheng, Y., Naslund, M., Selander, G., Fogelstrom, E.: Privacy in machine-to-machine communications a state-of-the-art survey. In: 2012 IEEE International Conference on Communication Systems (ICCS). IEEE, pp. 75–79 (2012)
Rudner, M.: Cyber-threats to critical national infrastructure: an intelligence challenge. Int. J. Intell. Counter Intell. 26(3), 453–481 (2013)
Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. Veh. Technol. Mag. IEEE 4(3), 69–75 (2009)
Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: Foundations of Security Analysis and Design V. Springer, Berlin, pp. 289–338 (2009)
Kozik, R., Choras, M.: Current cyber security threats and challenges in critical infrastructures protection. In: 2013 Second International Conference on Informatics and Applications (ICIA). IEEE, pp. 93–97 (2013)
Mahalle, P.N., Prasad, N.R., Prasad, R.: Object classification based context management for identity management in internet of things. Int. J. Comput. Appl. 63(12), 1–6 (2013)
Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., Razafindralambo, T.: A survey on facilities for experimental internet of things research. Commun. Mag. IEEE 49(11), 58–67 (2011)
Benazzouz, Y., Munilla, C., Gunalp, O., Gallissot, M., Gurgen, L.: Sharing user IoT devices in the cloud. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp. 373–374 (2014)
Køien, G.M.: Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wirel. Pers. Commun. 61(3), 495–510 (2011)
Watts, D.: Security and vulnerability in electric power systems. In: 35th North American Power Symposium, vol. 2, pp. 559–566 (2003)
Bertino, E., Martino, L.D., Paci, F., Squicciarini, A.C.: Web services threats, vulnerabilities, and countermeasures. In: Security for Web Services and Service-Oriented Architectures. Springer, Berlin, pp. 25–44 (2010)
Padmavathi, D.G., Shanmugapriya, M. et al.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Thoma, M., Meyer, S., Sperner, K., Meissner, S., Braun, T.: On IoT services: survey, classification and enterprise integration. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom). IEEE, pp. 257–260 (2012)
Abomhara, M., Koien, G.: Security and privacy in the internet of things: current status and open issues. In: PRISMS 2014 The 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014
Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M., Doody, P.: Internet of things strategic research roadmap. Internet Things Global Technol. Soc. Trends 1, 9–52 (2011)
Dahbur, K., Mohammad, B., Tarakji, A.B.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. ACM, p. 12 (2011)
Brauch, H.G.: Concepts of security threats, challenges, vulnerabilities and risks. In: Coping with Global Environmental Change, Disasters and Security. Springer, Berlin, pp. 61–106 (2011)
Pipkin, D.L.: Information security. Prentice Hall PTR (2000)
Andreev, S., Koucheryavy, Y.: Internet of things, smart spaces, and next generation networking. Springer, LNCS 7469, 464 (2012)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sharma, R., Mahapatra, R.P., Sharma, N. (2020). The Internet of Things and Its Applications in Cyber Security. In: Balas, V., Solanki, V., Kumar, R., Ahad, M. (eds) A Handbook of Internet of Things in Biomedical and Cyber Physical System. Intelligent Systems Reference Library, vol 165. Springer, Cham. https://doi.org/10.1007/978-3-030-23983-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-23983-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23982-4
Online ISBN: 978-3-030-23983-1
eBook Packages: EngineeringEngineering (R0)