Abstract

Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices.

Highlights

  • The rise of the Internet of things (IoT) is one of the inventions that have a special significance in the world of communication technology

  • This paper provides an overview of different kinds of cybersecurity attacks against Internet of Things (IoT) devices as well as an analysis of IoT architecture

  • This study presents a general survey of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture

Read more

Summary

Introduction

The rise of the Internet of things (IoT) is one of the inventions that have a special significance in the world of communication technology. If we do not take necessary precautions against those vulnerabilities, malicious hackers will take advantage of these poorly secured IoT devices to disrupt communications or even physically harm people. Since IoT is a distributed system, it will transmit most of its data wirelessly which makes it vulnerable to wireless security attacks such as eavesdropping, denial of service, spoofing, message injection, and jamming [4]. To overcome these security challenges, we need to come with security solutions that use low overhead protocols and inexpensive computational algorithms and can provide strong encryption and authentication to IoT devices.

An Overview of IoT Architecture
Physical Layer
Network Layer
Middleware Layer
Application Layer
Cybersecurity Attacks against IoT Devices
Physical Attacks against IoT Devices
Network Attacks against IoT Devices
Application Attacks against IoT Devices
Zigbee Attacks against IoT Devices
Z-Wave Attacks against IoT Devices
IoT Security Solutions
Authentication
Secure Communication Solutions
Application Security
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.