Abstract
The increasing interconnectedness and intelligence of everything are fostering digital transformation across industries. Nonetheless, the advent of the Internet of Everything (IoE) also introduces new cybersecurity risks, given the diverse mechanisms employed by IoE applications due to the heterogeneous nature of IoE environments. This chapter provides a comprehensive overview of cybersecurity issues related to IoE components and technologies, layered architectures, threats and attacks, and vulnerabilities. The main contribution of this chapter is a 3D cybersecurity model based on the presented IoE components, enabler technologies, and multi-layered architecture. In addition, IoE cybersecurity threats and attacks, challenges, and solutions are highlighted through a multi-layered architecture to provide a better understanding and knowledge of addressing and implementing appropriate approaches to prevent recent cybersecurity threats and attacks in IoE at each layer based on different components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qureshi KN (2018) New Trends in Internet of Things, Applications, Challenges, and Solutions. TELKOMNIKA (Telecommunication Computing Electronics and Control) 16 (3):1114-1119. doi:https://doi.org/10.12928/TELKOMNIKA.v16i3.8483
Khan WZ, Rafique W, Haider N, Hakak S, Imran M (2022) Internet of Everything: Enabling Technologies, Applications, Security and Challenges. TechRxiv Preprint. doi:https://doi.org/10.36227/techrxiv.21341796.v1
Mohanty SP, Yanambaka VP, Kougianos E, Puthal D (2020) PUFchain: A hardware-assisted blockchain for sustainable simultaneous device and data security in the internet of everything (IoE). IEEE Consumer Electronics Magazine 9 (2):8-16. doi:https://doi.org/10.1109/MCE.2019.2953758
Ryoo J, Kim S, Cho J, Kim H, Tjoa S, DeRobertis C IoE security threats and you. In: 2017 International Conference on Software Security and Assurance (ICSSA), 2017. IEEE, pp 13–19. doi: 10.1109/ICSSA.2017.28
Konev A, Shelupanov A, Kataev M, Ageeva V, Nabieva A (2022) A survey on threat-modeling techniques: protected objects and classification of threats. Symmetry 14 (3):549. doi:https://doi.org/10.3390/sym14030549
Li L, Pahlevanzadeh B (2021) Evaluation of the trust values among human resources in the enterprise cloud using an optimization algorithm and fuzzy logic. Kybernetes 51 (6):2008-2029. doi:https://doi.org/10.1108/K-04-2021-0280
Swathi GC, Kumar GK, Kumar AS (2022) Estimating Botnet Impact on IoT/IoE networks using Traffic flow Features. Computers and Electrical Engineering 102:108209
Qureshi KN, Alhudhaif A, Haider SW, Majeed S, Jeon G (2022) Secure Data Communication for Wireless Mobile Nodes in Intelligent Transportation Systems. Microprocessors and Microsystems:104501. doi:https://doi.org/10.1016/j.micpro.2022.104501
HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14:100129. doi:https://doi.org/10.1016/j.iot.2019.100129
Pahlevanzadeh B, Koleini S, Fadilah SI Security in IOT: Threats and vulnerabilities, layered architecture, encryption mechanisms, challenges and solutions. In: Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers, 2021. Springer, pp 267–283. doi:10.3390/electronics11203330
Chen K, Zhang S, Li Z, Zhang Y, Deng Q, Ray S, Jin Y (2018) Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security 2:97-110
Zhen-hua D, Jin-tao L, Bo F A taxonomy model of RFID security threats. In: 2008 11th IEEE International Conference on Communication Technology, 2008. https://doi.org/10.1109/ICCT.2008.4716242
Stan O, Bitton R, Ezrets M, Dadon M, Inokuchi M, Ohta Y, Yagyu T, Elovici Y, Shabtai A (2020) Extending attack graphs to represent cyber-attacks in communication protocols and modern it networks. IEEE Transactions on Dependable and Secure Computing 19 (3):1936-1954. doi:https://doi.org/10.1109/TDSC.2020.3041999
Sadhu PK, Yanambaka VP, Abdelgawad A (2022) Internet of Things: Security and Solutions Survey. Sensors 22 (19):7433. doi:https://doi.org/10.3390/s22197433
Atamli AW, Martin A Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things, 2014. IEEE, pp 35–43. doi:https://doi.org/10.1109/SIoT.2014.10
Lu Y, Da Xu L (2018) Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal 6 (2):2103-2115. doi:https://doi.org/10.1109/JIOT.2018.2869847
Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2020) A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Computer Networks 183:107593. doi:https://doi.org/10.1016/j.comnet.2020.107593
Nawir M, Amir A, Yaakob N, Lynn OB Internet of Things (IoT): Taxonomy of security attacks. In: 2016 3rd international conference on electronic design (ICED), 2016. IEEE, pp 321–326. doi:https://doi.org/10.1109/ICED.2016.7804660
Rehman M, Javed IT, Qureshi KN, Margaria T, Jeon G (2022) A Cyber Secure Medical Management System by Using Blockchain. IEEE Transactions on Computational Social Systems:1–14. doi:https://doi.org/10.1109/TCSS.2022.3215455
Un Nisa K, Alhudhaif A, Qureshi KN, Hadi HJ, Jeon G (2022) Security Provision for Protecting Intelligent Sensors and Zero Touch Devices by using Blockchain Method for the Smart Cities. Microprocessors and Microsystems:104503. doi:https://doi.org/10.1016/j.micpro.2022.104503
Borgohain T, Kumar U, Sanyal S (2015) Survey of security and privacy issues of internet of things. arXiv preprint arXiv:150102211. doi:https://doi.org/10.48550/arXiv.1501.02211
Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Internet of Things Journal 6 (3):5132-5139. doi:https://doi.org/10.1109/JIOT.2019.2897119
Tariq U, Ahmed I, Bashir AK, Shaukat K (2023) A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 23 (8):4117. doi: https://doi.org/10.3390/s23084117
Raza S, Helgason T, Papadimitratos P, Voigt T (2017) SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things. Future Generation Computer Systems 77:40-51. doi:https://doi.org/10.1016/j.future.2017.06.008
Yang G, Xu J, Chen W, Qi Z-H, Wang H-Y (2010) Security characteristic and technology in the internet of things. Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban)/ Journal of Nanjing University of Posts and Telecommunications (Natural Nanjing University of Posts and Telecommunications) Natural 30 (4)
Falconer, Gordon, Mitchell S (2012) Smart city framework. Cisco Internet Business Solutions Group (IBSG) 12 no. 9 (2012): 2-10
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pahlevanzadeh, B., Ahmadpour, S. (2024). Cybersecurity Threats and Attacks in IoE Networks. In: Naseer Qureshi, K., Newe, T., Jeon, G., Chehri, A. (eds) Cybersecurity Vigilance and Security Engineering of Internet of Everything. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-031-45162-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-45162-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45161-4
Online ISBN: 978-3-031-45162-1
eBook Packages: EngineeringEngineering (R0)