Abstract
There is a global exponential increase in the number of connected devices, which leads to an increase in the vulnerabilities of IoT devices. Most IoT devices receive their data from an external environment. It can be any sensor data, but sometimes this data is sent into the cloud without any encryption due to the limited space in IoT devices. This paper aims to tackle this issue by using stateful inspection of the data and determining its authenticity with the help of the previous values received by the gateway and removing devices which do not satisfy the stateful inspection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/
https://behrtech.com/blog/infographic-10-must-know-iot-cybersecurity-stats/
https://www.intellectsoft.net/blog/biggest-iot-security-issues/
Baker, A.: Maintaining data integrity in Internet of Things applications. http://files.iccmedia.com/pdf/windriver160823.pdf
Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82741 (2019). https://doi.org/10.1109/access.2019.2924045
Seok, B., Park, J., Park, J.: A lightweight hash-based Blockchain architecture for industrial IoT. Appl. Sci. 9, 3740 (2019). https://doi.org/10.3390/app9183740
Mohanta, B., Jena, D., Ramasubbareddy, S., Daneshmand, M., Gandomi, A.: Addressing security and privacy issues of IoT using Blockchain technology. IEEE Internet of Things J. 8 881–888 (2020). https://doi.org/10.1109/JIOT.2020.3008906
Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H.: Blockchain technologies for the internet of things: research issues and challenges. IEEE Internet Things J. 6(2), 2188–2204 (2019). https://doi.org/10.1109/JIOT.2018.2882794
Machado, C.: IoT data integrity verification for cyber-physical systems using Blockchain. In: 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (2018). https://doi.org/10.1109/ISORC.2018.00019
Lau, C.H., Alan, K.Y., Yan, F.: Blockchain-based authentication in IoT networks. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, pp. 1–8 (2018), https://doi.org/10.1109/DESEC.2018.8625141
Hang, L., Kim, D.-H.: Design and implementation of an integrated IoT blockchain platform for sensing data integrity. Sensors 19 (2019). https://doi.org/10.3390/s19102228
Hakiri, A., Sellami, B., Ben Yahia, S., Berthou, P.: A Blockchain architecture for SDN-enabled tamper-resistant IoT networks. In: 2020 Global Information Infrastructure and Networking Symposium (GIIS). https://doi.org/10.1109/giis50753.2020.924849
(2021). https://www.engineersgarage.com/tutorials/application-layer-protocols-for-iot-iot-part-11
https://www.veracode.com/security/application-security-vulnerability-code-flaws-insecure-code# (2017)
Nebbione, G., Calzarossa, M.C.: Security of IoT application layer protocols: challenges and findings Fut. Internet 12(3), 55 (2020). https://doi.org/10.3390/fi12030055
Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, pp. 746–751 (2015), https://doi.org/10.1109/CSNT.2015.16
Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the Internet of Things. IEEE Sens. J. 13(10), 3711–3720 (2013). https://doi.org/10.1109/JSEN.2013.2277656
https://www.mocana.com/blog/5-key-challenges-in-securing-resource-constrained-iot-devices (2017)
Dike-Anyiam, B., Rehmani, O.: Biometric vs. Password authentication: a user’s perspective’. J. Inf. Warf, 5(1), 33–45 (2006). www.jstor.org/stable/26502888. Accessed 16 May 2021
Ogu, R.E., Chukwudebe, G.A.: Development of a cost-effective electricity theft detection and prevention system based on IoT technology. In: 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) (2017). https://doi.org/10.1109/nigercon.2017.828194
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Kumar, A., John, C.E., Joshua, A., Kaliamourthy, B., Arumugam, C. (2022). State Based IoT Security for Tamper Prevention. In: Misra, S., Oluranti, J., Damaševičius, R., Maskeliunas, R. (eds) Informatics and Intelligent Applications. ICIIA 2021. Communications in Computer and Information Science, vol 1547. Springer, Cham. https://doi.org/10.1007/978-3-030-95630-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-95630-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95629-5
Online ISBN: 978-3-030-95630-1
eBook Packages: Computer ScienceComputer Science (R0)