Internet of Things:A Study On Security and Privacy Threats: March 2017
Internet of Things:A Study On Security and Privacy Threats: March 2017
net/publication/316735737
CITATIONS READS
14 3,814
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by M. Qayyum on 10 October 2018.
Abstract—Today, the world is influenced by new emerging The results of the monitoring are used to develop better ways
technologies. As a result we are surrounded by a number of to save our environment.
smart devices. These smart devices make our life easy and B. Infrastructure management
convenient. On the contrary, we are exposed to a number of One of the prominent applications is the process to monitor
threats and cyber attacks. There is always a threat to our and control the operations of infrastructure like roads,
privacy. In this paper, we discuss the different applications of bridges and railway tracks etc. The change in structural
IOT and the security threats involved. conditions can compromise safety and increases risk, hence
it can be monitored by IOT infrastructure management. The
Keywords—IOT, Sensors, RFID, WSN, Security, Privacy, quality of service can be improved.
Internet Introduction
C. Manufacturing
I. INTRODUCTION The real time optimization of manufacturing can be
achieved. The production and supply can be managed by
Internet of Things (IOT) is a prominent part of internet
using sensors and control systems. This also leads to rapid
future. IOT has a infrastructure of network that is global
manufacturing of new products.
where any object that is physically connected to internet has
an identity and can communicate with the other devices on
D. Home Automation
the internet. The devices like computers, cell phones, tabs,
The information about the gas, water and power can be sent
washing machines etc are a few to name. IOT is a huge
to their utility company by an automated system. This
network of interconnected ‘things’. The devices contain
process can enhance the efficiency of the resources. The
micro chip that interconnects all the devices. These micro
home automation process can manipulate the devices like
chips track the surroundings and report the same in the
washing machine, air conditioner, windows, doors, lighting
network as well as to the humans. The best part of IOT is
and refrigerator to attain optimization.
that each and every physical entity can be communicated and
is accessible through the internet. As a result of the low cost
E. Transportation
internet, huge number of devices is connected to the internet.
IOT technologies were first used in this sector. It uses the
The number of devices connected to the internet in 2008 was
integration of light sensors, GPS and GSM. The vehicle can
more than the humans on the earth. According to a research
act as an entity and communicate with each other as well as
company, there were 4.48 billion devices connected to the
road side infrastructure. The sensors in the vehicles can be
internet and the growth in 2016 is expected to be 30%. By
used to avoid collision, traffic management and to provide
2020 it is expected to reach 50 billion. These devices result
space for parking.
as a surface for attackers.
F. Medical and Health care system
II. APPLICATIONS OF IOT It is one of the promising areas of IOT technology. The
patient’s vital parameters can be transmitted by medical
Internet of Things covers almost every area of our lives. devices to a platform like secure cloud where it is stored and
Some of them are as follows:- analyzed. A special care can be provided to the aged and
chronic disease patients.
A. Environmental Monitoring
The environmental protection is done by using sensors and
by monitoring the atmospheric conditions like air and water
quality. The wildlife is also monitored to know their habitats.
2. Node Replication
In this attack, an existing node id is copied to a network
with sensor. As a result of duplication of node packets
are mis-routed, false sensor readings are recorded or a
disconnection of network takes place. Thus, a sensor
network's performance is disrupted.
Fig.7. Wormhole Attack
5. Sybil Attack
Sybil attack takes place when a computer is hijacked
and the hacker claims multiple identities. In this attack,
an adversary can manage to be at more than one place at
one time. Here a single node presents multiple identities
in the network which leads to significant reduction of
effectiveness of fault tolerance.
Fig.8. Sybil Attack Fig.10. Eavesdropping
6. Sinkhole Attack
In this attack, an intruder takes over a node inside the B. Radio Frequency Identification Technology:
network and attracts all the traffic from neighbor nodes.
Radio-frequency identification (RFID) consists of
This process is carried out by using the routing several RFID tags and one or more RFID readers. There
algorithm and attracting the other nodes. Thus, being
is a specified address on the tags and these are attached
part of the routing process, different attacks can take
to objects. This tag acts as a unique identifier for that
place including forwarding the packets selectively, object. RFID tags are used to keep a track of production,
changing the message or deleting the packets.
monitor patient's health parameters, monitor temperature
and humidity of food item, shopping, animal tracking,
access control etc. There are various attacks against
RFID technology. Some of the attacks are:
1. Physical Data Modification
The tags are obtained physically and the data is altered.
The fault induction or memory writing is used to
modify. Fault induction is a process of modifying data
when it is written or processed. Memory writing can be
performed by using special equipments like laser cutting
microscopes or small charged needle. These attacks lead
to inaccuracy of tags data. For example, a RFID tag
attached to a manufactured product gives wrong
information about the item. Moreover, the tag can be not
traceable.
2. Tag Cloning
Fig.9. Sinkhole Attack
The process of replacing the original tag with the new
7. Service Attack denial one and copying original tag identifier (id) to it. The
The services are made unavailable to legitimate users. tags and software are available in the market. Attacker
Here, the links of victim are destroyed with legitimate- can easily replace the original tag with the new one, if
like requests from attacker by flooding them. Hence, all no physical access protection is used for RFID tags.
the services are denied to the legitimate users.
3. Tag Swapping
8. Eavesdropping
In this attack, while the information is transmitted Tag swapping is achieved by replacing the tags of two
between the two nodes over the network, the intruder different products with each other. This kind of attack
listens to the information. Here, the information remains usually occurs in retail stores where a high priced tag is
the same but its privacy is compromised. This exchanged with a low price tag. The high priced product
information can be used by the intruders against the is purchased at lesser rate.
users.
4. Denial of Service Attack
If the information is requested by a RFID reader from a
tag, the identification id of the tag is received. Then it
compares it with the id stored in its database. The tag
fails to sends its identity to the reader if the DOS attack [10] Gubbi, J., Buyya, R., Marusic, S., &Palaniswami, M. (2013). Internet
has occurred. The connection between the tag and the of Things (IoT): A vision, architectural elements, and future
reader will not be stable and the service will be directions. Future Generation Computer Systems, 29(7), 1645-1660.
[11] Hossain, M. M., Fotouhi, M., &Hasan, R. (2015). Towards an
interrupted.
Analysis of Security Issues, Challenges, and Open Problems in the
Internet of Things. 2015 IEEE World Congress on Services.
VI. CONCLUSION [12] Juels, A. (2006). RFID security and privacy: a research survey. IEEE
J. Select. Areas Commun,24(2), 381-394.
IoT has emerged as a significant technology. The data that [13] MacGillivray, Carrie, Worldwide Internet of Things Forecast Update,
is transmitted from sensors or RFID tags may carry sensitive 2015-2019, International Data Corporation (IDC), February 2016.
information which must be protected from unauthorized [14] Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013).
access. The IoT communication between two nodes is not Identity Authentication and Capability Based Access Control
secure and the physical security of IoT devices should not be (IACAC) for the Internet of Things. Journal of Cyber Security and
compromised. To achieve secure communication, IoT must Mobility, 1(4), 309-348.
include services such as encryption, end-to-end- [15] Maidamwar, P., &Chavhan, N. (2012). A Survey on Security Issues
environments, and access control for real-time and critical to Detect Wormhole Attack in Wireless Sensor
Network. IJANS, 2(4), 37-50.
infrastructure protection. It is challenging in cybercrime to
[16] Mattern, F., &Floerkemeier, C. (2010). From the Internet of
stay ahead of the attacker. In future, we can expect more
Computers to the Internet of Things. Lecture Notes in Computer
security for smart devices & the privacy criteria of IoT Science, 242-259.
communication will increase which will allow the users to [17] Sarni, W., Mariani, J.; Kaji, J.; From Dirt to Data, The second green
automate tasks conveniently using this technology. IoT with revolution and the Internet of Things. Deloitte Review, issue 18,
better privacy, data protection techniques and ethical 2016.
practices will surely win user’s trust and gain competitive [18] Sathish Kumar, J., & R. Patel, D. (2014). A Survey on Internet of
advantage in the connected world. Things: Security and Privacy Issues. International Journal of
Computer Applications, 90(11), 20-26.
[19] Singla, A., &Sachdeva, R. (2013). Review on Security Issues and
VII. REFERENCES Attacks in Wireless Sensor Networks. International Journal of
Advanced Research in Computer Science and Software
[1] Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S., &Sadeghi, S. (2012). Engineering, 3(4), 529-534.
A Novel Algorithm for Detecting Sinkhole Attacks in [20] Sklavos, N., &Agarwal, V. (2008). RFID Security. From RFID to the
WSNs. IJCTE, 4(3), 418-421. Next-Generation Pervasive Networked Systems, 107-125.
[2] Balte, A., Kashid, A., &Patil, B. (2015). Security Issues in Internet of [21] Soni, V., Modi, P., &Chaudhari, V. (2013). Detecting Sinkhole
Things (IoT): A Survey.International Journal of Advanced Research Attack in Wireless Sensor Network. International Journal of
in Computer Science and Software Engineering, 5(4), 450-455. ISSN: Application or Innovation in Engineering & Management
2277 128X. (IJAIEM), 2(2), 29-32.
[3] Botta , A., de Donato, W., Persico, V. and Pescape, A., “ Integration [22] Sushma, Nandal, D., &Nandal, V. (2011). Security Threats in
of Cloud computing and Internet of things: A Survey”, Future Wireless Sensor Networks.IJCSMS International Journal of
Generation Computer Systems, Volume 56, March 2016, pp. 684- Computer Science & Management Studies, 1(11).
700. [23] Tsai, C., Lai, C., &Vasilakos, A. V. (2014). Future Internet of
[4] Chowdhury, M., Kader, M. F., &Asaduzzaman. (2013). Security Things: open issues and challenges. Wireless Netw, 20(8), 2201-
Issues in Wireless Sensor Networks: A Survey. International Journal 2217.
of Future Generation Communication and Networking, 6(5), 97-116. [24] U.Farooq, M., Waseem, M., Khairi, A., &Mazhar, S. (2015). A
[5] D. Ruiz (Ed) et.al., Modelling the trustworthiness of the IOT, Critical Analysis on the Security Concerns of Internet of Things
RERUM Deliverable D3.3, April 2016. (IoT). International Journal of Computer Applications, 111(7), 1-6.
[6] Dlodlo, N., Foko, T., Mvelase, P., &Mathaba, S. (2012). The State of [25] Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V.,
Affairs in Internet of Things Research Volume Issue,. The Electronic Wiesmaier, A., &Kikiras, P. (2015). On the Security and Privacy of
Journal Information Systems Evaluation, 15(3), (244- 258). Internet of Things Architectures and Systems. 2015 International
[7] Douceur, J. R. (2002). The Sybil Attack. Peer-to-Peer Systems, 251- Workshop on Secure Internet of Things (SIoT).
260. [26] Z L., & T X. (2013). Threat Modeling and Countermeasures Study
[8] EU-China Joint White Paper on the Internet of Things, China for the Internet of Things.JCIT, 8(5), 1163-1171.
Academy of Information and Communications Technology (CAICT)
& European Commission –DG CONNECT, January 2016.
[9] Gianluca Aloi, Giuseppe Caliciuri , Giancarlo Fortino, Raffaele
Gravina, Pasquale pace, Wilma Russo and Claudio Savaglio, A
Mobile Multi Technology Gateway to enable IOT Interoperability, In
proceeding of the IEEE IOTDI Conference, Berlin(Germany) 2016.