Skip to main content

IoT Attacks Countermeasures: Systematic Review and Future Research Direction

  • Conference paper
  • First Online:
Big Data Technologies and Applications (BDTA 2023)

Abstract

In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has emerged as an efficient technology. This technology makes things easier, safer, and more productive for us all. These nodes are often resource-constrained because of their involvement in a huge network of heterogeneous devices, making them the weakest link in the chain for a cyber attacker because they generate enormous amounts of data despite a number of limitations, including memory, power, and low processor of the device. So these limitations make IoT devices vulnerable to a variety of security attacks. In this paper, we presented a survey on attacks IoT countermeasures, systematic reviews, and analyses of various IoT attacks that are occurring, classified them, discussed their defences, and identified the most significant IoT attacks countermeasures. A state-of-the-art analysis of the different attacks, including their effectiveness and degree of damage in IoT devices, has been given and contrasted. We identify the advantages and disadvantages of IoT Attack Countermeasures and proposed a Novel IoT Attack Countermeasures. Finally, we identify the open-research issue in the domain and provide directions for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things, European Commision, 3(3), pp. 34–36 (2010)

    Google Scholar 

  2. Brock, D.L.: The Electronic Product Code (EPC) - A naming scheme for physical objects. White paper (2001)

    Google Scholar 

  3. Ghaleb, B.: Lecture notes in Introduction to Internet of Things (IoT). School of Computing, Edinburgh Napier University (2022). Accessed November 2022

    Google Scholar 

  4. Santoso, F.K. Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE, June 2015

    Google Scholar 

  5. Rafsanjani, H.N., Ghahramani, A.: Towards utilizing internet of things (IoT) devices for understanding individual occupants’ energy usage of personal and shared appliances in office buildings. J. Build. Eng. 27, 100948 (2020)

    Article  Google Scholar 

  6. Basford, P.J., Bulot, F.M., Apetroaie-Cristea, M., Cox, S.J., Ossont, S.J.: LoRaWAN for smart city IoT deployments: a long term evaluation. Sensors 20(3), 648 (2020)

    Article  Google Scholar 

  7. Al-Emran, M., Malik, S.I., Al-Kabi, M.N.: A survey of Internet of Things (IoT) in education: opportunities and challenges. In: Hassanien, A.E., Bhatnagar, R., Khalifa, N.E.M., Taha, M.H.N. (eds.) Toward social internet of things (SIoT): Enabling technologies, architectures and applications. SCI, vol. 846, pp. 197–209. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-24513-9_12

    Chapter  Google Scholar 

  8. Kaiser, M.S., et al.: Advances in crowd analysis for urban applications through urban event detection. IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst. 19(10), 3092–3112 (2017)

    Article  Google Scholar 

  9. Ebrahimi, P., Moghaddam, D.K., Mehrabani, Y.S.S.: Challenges and Opportunities of Big data and IoT in the Electronic Banking Industry: A Systematic Literature Review (2022)

    Google Scholar 

  10. Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2(1), 139 (2020)

    Article  Google Scholar 

  11. Burhanuddin, M.A., Mohammed, A.A.J., Ismail, R., Hameed, M.E., Kareem, A.N., Basiron, H.: A review on security challenges and features in wireless sensor networks: IoT perspective. J. Telecommun. Electron. Comput. Eng. (JTEC) 10(1–7), 17–21 (2018)

    Google Scholar 

  12. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE IoT J. 4(5), 1125–1142 (2017)

    Google Scholar 

  13. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4(5), 1250–1258 (2017)

    Google Scholar 

  14. Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 108, 909–920 (2020)

    Article  Google Scholar 

  15. Martin, J.: Osborne, Postscapes, History of Internet of Things. http://postscapes.com/internet-of-things-history. Accessed 10 Nov 2022

  16. Howarth, J.: DataProt, 80+ Amazing IoT Statistics 2022–2030, 20 July 2022. https://explodingtopics.com/blog/iot-stats. Accessed 10 Nov 2022

  17. Jovanovic, B.: Internet of Things statistics for 2022 - Taking Things Apart. DataProt, 13 May 2022. https://dataprot.net/statistics/iot-statistics/. Accessed 10 Nov 2022

  18. Viala, S.: Reva Solution, Internet Of Things: New Challenges And Practices For Information Governance, 8 April 2015. http://www.revasolutions.com/internet-of-things-new-challenges-and-practices-for-information-governance/. Accessed 10 Nov 2022

  19. Khanam, S., Ahmedy, I.B., Idris, M.Y.I., Jaward, M.H., Sabri, A.Q.B.M.: A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things. IEEE Access 8, 219709–219743 (2020)

    Article  Google Scholar 

  20. Ashraf, U.: PROSE–proactive resilience in Internet of Things: targeted attacks and countermeasures. IEEE Sens. J. 18(24), 10049–10057 (2018)

    Article  Google Scholar 

  21. Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32–37. IEEE, February 2017

    Google Scholar 

  22. Panchal, A.C., Khadse, V.M., Mahalle, P.N.: Security issues in IIoT: a comprehensive survey of attacks on IIoT and its countermeasures. In: 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN). pp. 124–130. IEEE, November 2018

    Google Scholar 

  23. Zaman, S., et al.: Security threats and artificial intelligence based counter-measures for internet of things networks: a comprehensive survey. IEEE Access 9, 94668–94690 (2021)

    Article  Google Scholar 

  24. Algarni, A.: A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7, 101879–101894 (2019)

    Article  Google Scholar 

  25. Gautam, S., Malik, A., Singh, N., Kumar, S.: Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd International Conference on Signal Processing and Communication (ICSPC), pp. 315–319. IEEE, March 2019

    Google Scholar 

  26. Dofe, J., Nguyen, A., Nguyen, A.: Unified countermeasures against physical attacks in Internet of Things - a survey. In: 2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), pp. 194–199. IEEE, December 2021

    Google Scholar 

  27. Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tut. 22(3), 1646–1685 (2020)

    Article  Google Scholar 

  28. Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tut. 22(3), 1686–1721 (2020)

    Article  Google Scholar 

  29. Horrow, S., Sardana, A.: Identity management framework for cloud based internet of things. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 200–203, August 2012

    Google Scholar 

  30. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tut. 17(4), 2347–2376 (2015)

    Article  Google Scholar 

  31. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw.Distrib. Sens. Netw. 9(8), 794326 (2013)

    Article  Google Scholar 

  32. Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., Du, H.-Y.: Research on the architecture of internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5-484–V5-487. IEEE (2010)

    Google Scholar 

  33. Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling communication technologies for smart cities. IEEE Commun. Mag.Commun. Mag. 55(1), 112–120 (2017)

    Article  Google Scholar 

  34. Negash, B., Rahmani, A.-M., Westerlund, T., Liljeberg, P., Tenhunen, H.: LISA: lightweight internet of things service bus architecture. Procedia Comput. Sci. 52, 436–443 (2015)

    Article  Google Scholar 

  35. Chaqfeh, M.A., Mohamed, N.: Challenges in middleware solutions for the Internet of Things. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), pp. 21–26. IEEE (2012)

    Google Scholar 

  36. Datta, S.K., Bonnet, C., Nikaein, N.: An IoT gateway centric architecture to provide novel M2M services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 514–519. IEEE (2014)

    Google Scholar 

  37. Seleznev, S., Yakovlev, V.: Industrial application architecture IoT and protocols AMQP, MQTT, JMS, REST, CoAP, XMPP, DDS. Int. J. Open Inf. Technol. 7(5), 17–28 (2019)

    Google Scholar 

  38. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Google Scholar 

  39. Kharrufa, H., Al-Kashoash, H.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens. J. 19(15), 5952–5967 (2019)

    Article  Google Scholar 

  40. Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., Liu, W.: Study and application on the architecture and key technologies for IoT. In: 2011 International Conference on Multimedia Technology, pp. 747–751. IEEE (2011)

    Google Scholar 

  41. Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146–150. IEEE (2005)

    Google Scholar 

  42. Tahir, R., Tahir, H., McDonald-Maier, K., Fernando, A.: A novel icmetric based framework for securing the Internet of Things. In: 2016 IEEE International Conference on Consumer Electronics (ICCE), pp. 469–470. IEEE (2016)

    Google Scholar 

  43. Hopkins, A.B., McDonald-Maier, K.D., Papoutsis, E., Howells, W.G.J.: Ensuring data integrity via ICmetrics based security infrastructure. In: Second NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2007, pp. 75–81. IEEE (2007)

    Google Scholar 

  44. Aldweesh, A., Derhab, A., Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl. Based Syst. 189, 105124 (2020)

    Article  Google Scholar 

  45. Kim, J., Caire, G., Molisch, A.F.: Quality-aware streaming and scheduling for device-to-device video delivery. IEEE/ACM Trans. Netw. 24(4), 2319–2331 (2015)

    Article  Google Scholar 

  46. Fang, W., Tan, X., Wilbur, D.: Application of intrusion detection technology in network safety based on machine learning. Saf. Sci. 124, 104604 (2020)

    Article  Google Scholar 

  47. Hasan, M.M., Islam, M.M., Zarif, I.I., Hashem, M.M.A.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019)

    Article  Google Scholar 

  48. Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)

    Article  Google Scholar 

  49. Chandra, S., Paira, S., Alam, S.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 83–93. IEEE (2014)

    Google Scholar 

  50. Hussen, H.R., Tizazu, G.A., Ting, M., Lee, T., Choi, Y., Kim, K.-H.: SAKES: secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In: 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 246–251. IEEE (2013)

    Google Scholar 

  51. Jeba, A., Paramasivan, B., Usha, D.: Security threats and its countermeasures in wireless sensor networks: an overview. Int. J. Comput. Appl. 29(6), 15–22 (2011)

    Google Scholar 

  52. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)

    Article  Google Scholar 

  53. Baskar, C., Balasubramaniyan, C., Manivannan, D.: Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Comput. Sci. 78, 165–171 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joshua Teddy Ibibo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ibibo, J.T. (2024). IoT Attacks Countermeasures: Systematic Review and Future Research Direction. In: Tan, Z., Wu, Y., Xu, M. (eds) Big Data Technologies and Applications. BDTA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 555. Springer, Cham. https://doi.org/10.1007/978-3-031-52265-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-52265-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-52264-2

  • Online ISBN: 978-3-031-52265-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics