Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures

Institute of Electrical and Electronics Engineers (IEEE) - Tập 22 Số 1 - Trang 616-644 - 2020
İsmail Butun1, Patrik Österberg2, Houbing Song3
1Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden
2Department of Information Systems and Technology, Mid Sweden University, Sundsvall, Sweden
3Department of Electrical, Computer, Software, and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, USA.

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1109/ATNAC.2017.8215418

10.1109/WoWMoM.2015.7158207

10.1109/IEEE.ICIOT.2017.11

10.1109/FAS-W.2016.58

10.1145/2897937.2905020

2017, CC13×0 CC26×0 SimpleLink™ Wireless MCU Technical Reference Manual

10.1109/LCN.2004.38

10.1109/PERCOMW.2017.7917634

10.1007/978-1-4613-9323-8_24

10.1109/JSYST.2018.2890039

becker, 2017, Intrusion detection system framework for Internet of Things

10.1109/MCOM.2017.1700013

10.1109/MCOM.2014.6979984

10.1109/ICCEREC.2016.7814989

banks, 2014

10.17487/RFC7641

10.17487/rfc7252

10.1145/2994551.2996707

nikshepa, 2018, 6LoWPAN—Performance analysis on low power networks, Proc Int Conf Comput Netw Commun Technol (ICCNCT), 15, 145

10.1145/2633675.2633678

10.17487/RFC7733

10.1016/j.jnca.2011.03.005

10.1109/JIOT.2019.2905743

10.1109/TDSC.2014.2316816

lu, 2014, Secure and efficient data transmission for cluster-based wireless sensor networks, IEEE Trans Parallel Distrib Syst, 25, 750, 10.1109/TPDS.2013.43

10.1016/j.proeng.2012.01.063

10.1155/2014/209436

stallings, 2018, Computer Security Principles and Practice Global Edition

al-faruque, 2012, Networking elements as a patch distribution platform for distributed automation and control domains

10.1109/ACCESS.2016.2517321

10.1016/j.comnet.2014.11.008

10.1007/978-3-658-10934-9_11

10.1109/JIOT.2018.2812239

10.1016/j.jnca.2014.01.014

10.1145/3213299.3213304

10.1016/j.comnet.2018.11.017

10.3390/fi11010003

10.1016/j.icte.2017.03.004

10.3390/s18113995

10.1109/TSC.2014.2365797

10.1109/TMC.2007.250674

10.1109/CCWC.2017.7868419

10.1109/REAL.2003.1253275

10.1109/JIOT.2017.2684221

10.1109/JIOT.2017.2759728

10.1145/3243734.3243781

10.1109/TAC.2015.2498708

10.1109/WiMOB.2015.7347956

10.1109/TMSCS.2015.2498605

li, 2017, Securing the Internet of Things

10.1109/JPROC.2017.2781198

10.1109/ASPDAC.2016.7428064

10.1109/HICSS.2000.926982

10.1186/s13638-015-0321-6

10.1109/JIOT.2015.2460333

10.1109/JPROC.2017.2780172

10.5220/0007587906230630

balte, 2015, Security issues in Internet of Things (IoT): A survey, Int J Adv Res Comput Sci Softw Eng, 5, 1

10.4018/978-1-5225-7189-6.ch004

10.1109/JIOT.2017.2720635

10.1007/978-981-10-3892-1

10.1002/9781119226444

10.1002/9781119226079

10.1109/ICCE.2019.8661909

10.1016/j.comnet.2014.11.003

10.1109/JIOT.2019.2904741

10.1109/ICCAD.2014.7001385

zhang, 2017, Understanding IoT security through the data crystal ball: Where we are now and where we are going to be, arXiv preprint arXiv 1703 10667

10.1109/MCOM.2017.1700390

sikder, 2018, A survey on sensor-based threats to Internet-of-Things (IoT) devices and applications, arXiv preprint arXiv 1802 02172

10.1109/SP.2019.00013

10.1109/MC.2017.62

osborne, 2018, Meet Torii a New IoT BotNet Far More Sophisticated Than Mirai Variants

10.1109/JIOT.2017.2683200

friedman, 2018, On the edge Solving the challenges of edge computing in the era of iot

10.1109/TII.2014.2302638

10.1109/CCWC.2017.7868374

10.1109/JSEN.2015.2502401

chaudhary, 2017, Privacy and security issues in Internet of Things, International Journal of Educational Research, 3, 2433

10.1109/PRISMS.2014.6970594

10.1109/JIOT.2017.2659783

apthorpe, 2017, Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic, arXiv preprint arXiv 1708 05044

10.1007/s10796-014-9492-7

2018, A Quick History of IoT BotNets

10.1109/MCOM.2016.7470945

10.1109/JIOT.2014.2329462

10.1109/ACCESS.2016.2529723

10.1109/JIOT.2017.2671460

rawat, 2017, Industrial Internet of Things Cybermanufacturing Systems

watteyne, 7554, Using IEEE 802.15.4e time-slotted channel hopping (TSCH) in the Internet of Things (IoT): Problem statement

song, 2016, Cyber-Physical Systems Foundations Principles and Applications

10.1109/METROI4.2018.8428344

10.1109/NCA.2008.13

10.1145/509506.509514

yu, 2006, Detecting selective forwarding attacks in wireless sensor networks, Proc IEEE 20th Int Parallel Distrib Process Symp (IPDPS), 8

li, 2009, Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks, Proc IEEE 6th Int Conf Mobile Adhoc Sens Syst (MASS), 1030

10.1109/MWC.2004.1269716

10.1145/2462096.2462107

10.1109/PERVASIVE.2015.7087034

wang, 2003, On supporting distributed collaboration in sensor networks, Proc IEEE Mil Commun Conf (MILCOM), 2, 752

10.1109/IAW.2005.1495980

10.1109/ICC.2008.306

10.1109/SP.2005.8

hu, 2003, Rushing attacks and defense in wireless ad hoc network routing protocols, Proc 2nd ACM Workshop Wireless Security, 30, 10.1145/941311.941317

ngai, 2006, On the intruder detection for sinkhole attack in wireless sensor networks, Proc IEEE Int Conf Commun (ICC), 8, 3383

10.1109/INFCOM.2003.1209219

10.1016/j.jcss.2013.06.017

10.1109/ICCMS.2010.95

10.1145/984622.984660

10.17487/rfc6550

10.1016/j.jcss.2013.06.016

10.1109/ICED.2016.7804660

10.1016/j.procs.2014.05.319

hu, 2004, Using directional antennas to prevent wormhole attacks, Proc NDSS, 241

10.1016/j.eswa.2015.05.057

el kaissi, 2005, DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks

10.1145/1023646.1023657

10.1109/CNS.2019.8802666

perrey, 2016, TRAIL: Topology Authentication in RPL, Proc Int Conf Embedded Wireless Syst Netw (EWSN), 59

10.1145/986858.986877

10.1109/MC.2002.1039518

10.1016/S1570-8705(03)00008-8

10.1109/MPRV.2008.6

10.1109/MASS.2011.76

çayirci, 2009, Security attacks in ad hoc, sensor and mesh networks, Security in Wireless Ad Hoc and Sensor Networks, 105, 10.1002/9780470516782.ch8

aura, 2000, DoS-resistant authentication with client puzzles, Proc Int Workshop Security Protocols, 170

10.1016/j.adhoc.2003.09.009

10.1109/WiMOB.2014.6962166

znaidi, 2008, An ontology for attacks in wireless sensor networks

da xu, 2014, Internet of Things in industries: A survey, IEEE Trans Ind Informat, 10, 2233, 10.1109/TII.2014.2300753

10.1109/MC.2002.1012427

10.1155/2009/957690

10.1109/CIACS.2014.6861324

10.1109/SURV.2013.050113.00191

ye, 2005, Statistical en-route filtering of injected false data in sensor networks, IEEE J Sel Areas Commun, 23, 839, 10.1109/JSAC.2005.843561

butun, 2013, Prevention and detection of intrusions in wireless sensor networks

10.1145/1065545.1065548

10.1109/TIFS.2016.2570740

10.1109/ENABL.2002.1030000

10.1109/AHICI.2009.5340351

10.1145/1031495.1031515

10.1109/ICCIT.2009.290

10.1145/974121.974123

10.1109/MOBHOC.2009.5336925

10.1109/ICPPW.2003.1240395

krishnan, 2016, A QoS parameter based solution for black hole denial of service attack in wireless sensor networks, Indian J of Sci and Technol, 9

10.1007/3-540-36978-3_23

karakehayov, 2005, Using reward to detect team black-hole attacks in wireless sensor networks, Proceedings of the workshop on Real-world wireless sensor networks, 20

10.1016/j.adhoc.2018.01.013

10.1109/ISIE.2014.6864831

10.1109/icc.2011.5962856

10.1109/LATINCOM.2015.7430139

10.1109/iccsp.2013.6577120

agah, 2007, Preventing DoS attacks in wireless sensor networks: A repeated game theory approach, Int J Netw Security, 5, 145

10.1109/CISS.2006.286400

chan, 2003, Random key predistribution schemes for sensor networks, Proc IEEE Symp Security Privacy, 197

10.1145/586115.586117

10.1016/j.jnca.2012.01.002

10.1002/sec.354

10.1016/j.jcss.2013.06.014

10.1016/j.jii.2017.02.002

padmavathi, 2009, A survey of attacks, security mechanisms and challenges in wireless sensor networks, Int J Comput Sci Inf Security, 4, 117

10.1109/ICACT.2006.206151

10.1109/ICDCS.2008.55

10.1007/3-540-45748-8_24

shabana, 2016, Security issues and attacks in wireless sensor networks, Int J Adv Res Comput Sci Electron Eng, 5, 81

10.1109/TSMCC.2007.905824

10.1109/JSEN.2014.2385734

bartariya, 2016, Security in wireless sensor networks: Attacks and solutions, Int J Adv Res Comput Commun Eng, 5, 214

10.1109/CSNT.2015.16

sharma, 2010, Wireless sensor networks: An overview on its security threats, Int J Comput Appl, 42

10.1109/INFCOM.2009.5062097

2016

kumar, 2015, Survey of security and privacy issues of Internet of Things, Int J Adv Netw Appl, 6, 2372

10.1109/JSAC.2005.861382

hamid, 2006, Routing security in sensor network: Hello flood attack and defense, Proc IEEE ICN, 2

10.1109/SECCOM.2007.4550353

10.1007/978-3-662-43862-6_12

10.1016/j.ipl.2011.02.017

10.3390/s151128960

10.1023/A:1016598314198

10.1109/ACSAC.2007.26

10.1145/1288107.1288119

10.1109/ICNP.2009.5339674

frank, 2011, Constrained Application Protocol (CoAP)

10.1109/ICBDSC.2016.7460363

10.1145/1102219.1102235

ghildiyal, 2014, Analysis of denial of service (DoS) attacks in wireless sensor networks, Int J Res Eng Technol, 3, 140, 10.15623/ijret.2014.0322030