PRIVACY AND SECURITY ISSUES IN INTERNET OF THINGS
Keywords:Attacks, Internet of things, Privacy, Risk, Security
Internet of Things (IoT) are all over in our daily life. They're utilized in our homes, in hospitals, deployed outside to control and report the changes in setting, forestall fires, and much more helpful practicality. However, all those advantages can return of a large number of risks including privacy loss and security problems. To secure the IoT devices, several analysis works are conducted to step those issues and realize an improved thanks to eliminate those risks, or at least minimize their effects on the user’s privacy and security requirements. In the first section IoT devices are discussed. The second one will present IoT device limitations and in third section the classification of attacks on IoT are discussed. The last section can focus on the security of IoT in different layers.
I. IoT Analytics, “Why the internet of things is called internet of things: Definition, history, disambiguation,” https://iot-analytics.com/internetof-things-definition/, 2014.
II. Saif,I., Peasley,S., and Perinkolam,A., “Safeguarding the internet of things: Being secure, vigilant, and resilient in the connected age,” https://dupress.deloitte.com/dup-us- en/deloittereview/issue-17/internet-of-things-data-security-and-privacy.html, 2015.
III. Talkin Cloud, “Iot past and present: The history of iot, and where it’s headed today,” http://talkincloud.com/cloud-computing/iot-past-andpresent-history-iot-and-where-its-headed-today?page=2, 2016.
IV. Rouse,M., “Iot security (internet of things security),” http://internetofthingsagenda.techtarget.com/definition/IoT-security- Internet-of-Things-security, 2013.
V. Trappe,W., Howard,R., and Moore, R.S.,“Low-energy security: Limits and opportunities in the internet of things,” IEEE Security Privacy, vol. 13, no. 1, pp. 14–21, Jan 2015.
VI. Jing,Q., Vasilakos,A.V., and Qiu,D. “Security of the internet of things: perspectives and chenges,” Wireless Networks,vol. 20, no. 8, pp. 2481–2501, 2014.
VII. Brachmann,M., Keoh,S.L., Morchon,O.G., and S. S. Kumar, “End-to end transport security in the ip-based internet of things,” in 2012 21st International Conference on Computer Communications and Networks (ICCCN), July 2012, pp. 1–5.
VIII. Wikipedia, “Mirai,” https://en.wikipedia.org/wiki/Mirai_(malware), 2016.
IX. Hummen,R., Ziegeldorf,J.H, Shafagh,H., Raza,S. and Wehrle,K., “Towards viable certificate-based authentication for the internet of things,” in Proceedings of the 2Nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, ser. Hot WiSec ’13, 2013, pp. 37–42.
X. Raza,S., Trabalza,D. and Voigt,T. “6lowpan compressed dtls for coap,” in 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, May 2012, pp. 287–289.
XI. Ronen,E., and Shamir,A., “Extended functionality attacks on iot devices: The case of smart lights,” in 2016 IEEE European Symposium on Security and Privacy (EuroS&P), March 2016, pp. 3–12.
XII. Andrea,I., Chrysostomou,C., and Hadjichristofi,G., “Internet of things: Security vulnerabilities and challenges,” in 2015 IEEE Symposium on Computers and Communication (ISCC), July 2015, pp. 180–187.
How to Cite
Copyright (c) 2021 International Education and Research Journal (IERJ)
This work is licensed under a Creative Commons Attribution 4.0 International License.