Abstract

The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, privileged-insider, remote hijacking, password guessing and denial of service (DoS) attacks, and malware attacks. Among these attacks, the attacks which are performed through the malware botnet (i.e., Mirai) are the malignant attacks. The existence of malware botnets leads to attacks on confidentiality, integrity, authenticity and availability of the data and other resources of the system. In presence of such attacks, the sensitive data of IoT communication may be disclosed, altered or even may not be available to the authorized users. Therefore, it becomes essential to protect the IoT/IoMT environment from malware attacks. In this review paper, we first perform the study of various types of malware attacks, and their symptoms. We also discuss some architectures of IoT environment along with their applications. Next, a taxonomy of security protocols in IoT environment is provided. Moreover, we conduct a comparative study on various existing schemes for malware detection and prevention in IoT environment. Finally, some future research challenges and directions of malware detection in IoT/IoMT environment are highlighted.

Highlights

  • The Internet of Things (IoT) is a network of physical objects such as smart machines, smart home appliances and many more

  • We provide a study on recent malware attacks (i.e., Mirai, Reaper, Echobot, Emotet, Gamut and Necurs) which may happen in IoT communication environment

  • TAXONOMY OF SECURITY PROTOCOLS IN IOT ENVIRONMENT we provide the details of security protocols used in IoT communication environment which provide security to the exchanged data well as to the stored data

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) is a network of physical objects such as smart machines, smart home appliances and many more. It becomes very serious issue in case of of IoMT that deals with the communication and controlling of smart medical devices. To spread malware in IoT environment, the hackers use network of attacker systems (i.e., botnet) (for example, Mirai, Reaper, Echobot, Emotet, Gamut and Necurs are very famous these days). These types of botnet attacks are possible in IoMT environment and can be used to hijack (control) a smart medical device remotely. We provide a study on recent malware attacks (i.e., Mirai, Reaper, Echobot, Emotet, Gamut and Necurs) which may happen in IoT communication environment.

OVERVIEW OF IOT COMMUNICATION ENVIRONMENT
DIFFERENT CATEGORIES OF MALWARE
CASE STUDY
TAXONOMY OF SECURITY PROTOCOLS IN IOT ENVIRONMENT
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call