Abstract
In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has emerged as an efficient technology. This technology makes things easier, safer, and more productive for us all. These nodes are often resource-constrained because of their involvement in a huge network of heterogeneous devices, making them the weakest link in the chain for a cyber attacker because they generate enormous amounts of data despite a number of limitations, including memory, power, and low processor of the device. So these limitations make IoT devices vulnerable to a variety of security attacks. In this paper, we presented a survey on attacks IoT countermeasures, systematic reviews, and analyses of various IoT attacks that are occurring, classified them, discussed their defences, and identified the most significant IoT attacks countermeasures. A state-of-the-art analysis of the different attacks, including their effectiveness and degree of damage in IoT devices, has been given and contrasted. We identify the advantages and disadvantages of IoT Attack Countermeasures and proposed a Novel IoT Attack Countermeasures. Finally, we identify the open-research issue in the domain and provide directions for future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things, European Commision, 3(3), pp. 34–36 (2010)
Brock, D.L.: The Electronic Product Code (EPC) - A naming scheme for physical objects. White paper (2001)
Ghaleb, B.: Lecture notes in Introduction to Internet of Things (IoT). School of Computing, Edinburgh Napier University (2022). Accessed November 2022
Santoso, F.K. Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE, June 2015
Rafsanjani, H.N., Ghahramani, A.: Towards utilizing internet of things (IoT) devices for understanding individual occupants’ energy usage of personal and shared appliances in office buildings. J. Build. Eng. 27, 100948 (2020)
Basford, P.J., Bulot, F.M., Apetroaie-Cristea, M., Cox, S.J., Ossont, S.J.: LoRaWAN for smart city IoT deployments: a long term evaluation. Sensors 20(3), 648 (2020)
Al-Emran, M., Malik, S.I., Al-Kabi, M.N.: A survey of Internet of Things (IoT) in education: opportunities and challenges. In: Hassanien, A.E., Bhatnagar, R., Khalifa, N.E.M., Taha, M.H.N. (eds.) Toward social internet of things (SIoT): Enabling technologies, architectures and applications. SCI, vol. 846, pp. 197–209. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-24513-9_12
Kaiser, M.S., et al.: Advances in crowd analysis for urban applications through urban event detection. IEEE Trans. Intell. Transp. Syst.Intell. Transp. Syst. 19(10), 3092–3112 (2017)
Ebrahimi, P., Moghaddam, D.K., Mehrabani, Y.S.S.: Challenges and Opportunities of Big data and IoT in the Electronic Banking Industry: A Systematic Literature Review (2022)
Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2(1), 139 (2020)
Burhanuddin, M.A., Mohammed, A.A.J., Ismail, R., Hameed, M.E., Kareem, A.N., Basiron, H.: A review on security challenges and features in wireless sensor networks: IoT perspective. J. Telecommun. Electron. Comput. Eng. (JTEC) 10(1–7), 17–21 (2018)
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE IoT J. 4(5), 1125–1142 (2017)
Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4(5), 1250–1258 (2017)
Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 108, 909–920 (2020)
Martin, J.: Osborne, Postscapes, History of Internet of Things. http://postscapes.com/internet-of-things-history. Accessed 10 Nov 2022
Howarth, J.: DataProt, 80+ Amazing IoT Statistics 2022–2030, 20 July 2022. https://explodingtopics.com/blog/iot-stats. Accessed 10 Nov 2022
Jovanovic, B.: Internet of Things statistics for 2022 - Taking Things Apart. DataProt, 13 May 2022. https://dataprot.net/statistics/iot-statistics/. Accessed 10 Nov 2022
Viala, S.: Reva Solution, Internet Of Things: New Challenges And Practices For Information Governance, 8 April 2015. http://www.revasolutions.com/internet-of-things-new-challenges-and-practices-for-information-governance/. Accessed 10 Nov 2022
Khanam, S., Ahmedy, I.B., Idris, M.Y.I., Jaward, M.H., Sabri, A.Q.B.M.: A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things. IEEE Access 8, 219709–219743 (2020)
Ashraf, U.: PROSE–proactive resilience in Internet of Things: targeted attacks and countermeasures. IEEE Sens. J. 18(24), 10049–10057 (2018)
Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32–37. IEEE, February 2017
Panchal, A.C., Khadse, V.M., Mahalle, P.N.: Security issues in IIoT: a comprehensive survey of attacks on IIoT and its countermeasures. In: 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN). pp. 124–130. IEEE, November 2018
Zaman, S., et al.: Security threats and artificial intelligence based counter-measures for internet of things networks: a comprehensive survey. IEEE Access 9, 94668–94690 (2021)
Algarni, A.: A survey and classification of security and privacy research in smart healthcare systems. IEEE Access 7, 101879–101894 (2019)
Gautam, S., Malik, A., Singh, N., Kumar, S.: Recent advances and countermeasures against various attacks in IoT environment. In: 2019 2nd International Conference on Signal Processing and Communication (ICSPC), pp. 315–319. IEEE, March 2019
Dofe, J., Nguyen, A., Nguyen, A.: Unified countermeasures against physical attacks in Internet of Things - a survey. In: 2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), pp. 194–199. IEEE, December 2021
Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tut. 22(3), 1646–1685 (2020)
Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tut. 22(3), 1686–1721 (2020)
Horrow, S., Sardana, A.: Identity management framework for cloud based internet of things. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 200–203, August 2012
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tut. 17(4), 2347–2376 (2015)
Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw.Distrib. Sens. Netw. 9(8), 794326 (2013)
Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., Du, H.-Y.: Research on the architecture of internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. V5-484–V5-487. IEEE (2010)
Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling communication technologies for smart cities. IEEE Commun. Mag.Commun. Mag. 55(1), 112–120 (2017)
Negash, B., Rahmani, A.-M., Westerlund, T., Liljeberg, P., Tenhunen, H.: LISA: lightweight internet of things service bus architecture. Procedia Comput. Sci. 52, 436–443 (2015)
Chaqfeh, M.A., Mohamed, N.: Challenges in middleware solutions for the Internet of Things. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), pp. 21–26. IEEE (2012)
Datta, S.K., Bonnet, C., Nikaein, N.: An IoT gateway centric architecture to provide novel M2M services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 514–519. IEEE (2014)
Seleznev, S., Yakovlev, V.: Industrial application architecture IoT and protocols AMQP, MQTT, JMS, REST, CoAP, XMPP, DDS. Int. J. Open Inf. Technol. 7(5), 17–28 (2019)
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Kharrufa, H., Al-Kashoash, H.A., Kemp, A.H.: RPL-based routing protocols in IoT applications: a review. IEEE Sens. J. 19(15), 5952–5967 (2019)
Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., Liu, W.: Study and application on the architecture and key technologies for IoT. In: 2011 International Conference on Multimedia Technology, pp. 747–751. IEEE (2011)
Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146–150. IEEE (2005)
Tahir, R., Tahir, H., McDonald-Maier, K., Fernando, A.: A novel icmetric based framework for securing the Internet of Things. In: 2016 IEEE International Conference on Consumer Electronics (ICCE), pp. 469–470. IEEE (2016)
Hopkins, A.B., McDonald-Maier, K.D., Papoutsis, E., Howells, W.G.J.: Ensuring data integrity via ICmetrics based security infrastructure. In: Second NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2007, pp. 75–81. IEEE (2007)
Aldweesh, A., Derhab, A., Emam, A.Z.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl. Based Syst. 189, 105124 (2020)
Kim, J., Caire, G., Molisch, A.F.: Quality-aware streaming and scheduling for device-to-device video delivery. IEEE/ACM Trans. Netw. 24(4), 2319–2331 (2015)
Fang, W., Tan, X., Wilbur, D.: Application of intrusion detection technology in network safety based on machine learning. Saf. Sci. 124, 104604 (2020)
Hasan, M.M., Islam, M.M., Zarif, I.I., Hashem, M.M.A.: Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019)
Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41–50 (2018)
Chandra, S., Paira, S., Alam, S.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 83–93. IEEE (2014)
Hussen, H.R., Tizazu, G.A., Ting, M., Lee, T., Choi, Y., Kim, K.-H.: SAKES: secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In: 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 246–251. IEEE (2013)
Jeba, A., Paramasivan, B., Usha, D.: Security threats and its countermeasures in wireless sensor networks: an overview. Int. J. Comput. Appl. 29(6), 15–22 (2011)
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24(6), 522–533 (2007)
Baskar, C., Balasubramaniyan, C., Manivannan, D.: Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Comput. Sci. 78, 165–171 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ibibo, J.T. (2024). IoT Attacks Countermeasures: Systematic Review and Future Research Direction. In: Tan, Z., Wu, Y., Xu, M. (eds) Big Data Technologies and Applications. BDTA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 555. Springer, Cham. https://doi.org/10.1007/978-3-031-52265-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-52265-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-52264-2
Online ISBN: 978-3-031-52265-9
eBook Packages: Computer ScienceComputer Science (R0)