Skip to main content

On the Feasibility of DoS Attack on Smart Door Lock IoT Network

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1364))

Included in the following conference series:

  • 844 Accesses

Abstract

The Internet of Things (IoT) is one of the most extensive technological evolution of the computing network. This technology can transform the physical world into a virtual world for testing and emulation to evaluate the key issues present in the physical devices. This work aims to explore the security in IoT devices and demonstrates the security gaps in the behavior of the smart door lock. In this paper, we conducted two surveys to gather consumers’ requirements about the IoT devices as to whether they do understand the security risks involves with these devices. Further, we carried out a denial of service attack on a smart lock device to demonstrate that such devices are not secure. This work also highlights the security weakness and suggest guidelines to improve the overall system using cloud and edge computing and authentication and access control-based solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bhuvaneswari, V., Porkodi, R.: The internet of things (IoT) applications and communication enabling technology standards: an overview. In: International Conference on Intelligent Computing Applications, pp. 324–329 (2014)

    Google Scholar 

  2. Weber, R.: Internet of Things – new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  3. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review.In: Intern’l Conference on Computer Science & Electronics Engineering, pp. 648–651 (2012)

    Google Scholar 

  4. Wan, J., Yan, H., Suo, H., Li, F.: Advances in cyber-physical systems research. KSII Trans. Internet Inf. Syst. 5(11), 1891–1908 (2011)

    Google Scholar 

  5. Desai, P., Sheth, A., Anantharam, P.: Semantic gateway as a service architecture for IoT interoperability. In: IEEE International Conference on Mobile Services, pp. 313–319 (2015)

    Google Scholar 

  6. Divya, M., Rao, M.: Centralized authentication smart locking system using RFID, fingerprint, password and GSM. Int. J. Eng. Technol. 7(3.12), p. 516 (2018)

    Google Scholar 

  7. Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  8. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)

    Article  Google Scholar 

  9. Kumar, A., Petracca, G., Aksu, H., Jaeger, T., Uluagac, S.: A survey on sensor-based threats to internet-of-things (IoT) Devices and Applications. arXiv, vol. 14 no. 1, pp. 2–14 (2018)

    Google Scholar 

  10. Burhan, M., Rehman, R., Khan, B., Kim, B.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)

    Article  Google Scholar 

  11. Khan, R., Khan, S., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 10th International Conference on Frontiers of Information Technology, Islamabad, pp. 257–260 (2012)

    Google Scholar 

  12. Sethi, P., Sarangi, S.: Internet of things: architectures, protocols, and applications. J. of Electr. Comput. Eng. 20(9), 1–25 (2017)

    Google Scholar 

  13. Xiaohui, X.: Study on security problems and key technologies of the internet of things. In: International Conference on Computational and Information Sciences, pp. 407–410 (2013)

    Google Scholar 

  14. Saxena, N., Choi, B., Lu, R.: Authentication and authorization scheme for various user roles and devices in smart grid. IEEE TIFS 11(5), 907–921 (2016)

    Google Scholar 

  15. Prabhakar, S.: Network security in digitalization: attacks and defence. Int. J. Res. Comput. Appl. Rob. 5(5), 46–52 (2017)

    Google Scholar 

  16. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027–2051 (2016)

    Article  Google Scholar 

  17. Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)

    Article  Google Scholar 

  18. Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of Things (IoT) communication protocols: review. In: 8th International Conference on Information Technology (ICIT), pp. 685–690 (2017)

    Google Scholar 

  19. Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system. In: IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 111–120 (2013)

    Google Scholar 

  20. Sharma, V., et al.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 17(1), 1–24 (2017)

    Google Scholar 

  21. Cai, Y., Genovese, A., Piuri, V., Scotti, F., Siegel, M.: IoT-based architectures for sensing and local data processing in ambient intelligence: research and industrial trends. In: IEEE International Instrumentation and Measurement Technology Conference, pp. 1–6 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neetesh Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Asad, B., Saxena, N. (2021). On the Feasibility of DoS Attack on Smart Door Lock IoT Network. In: Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., Fan, CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore. https://doi.org/10.1007/978-981-16-0422-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0422-5_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0421-8

  • Online ISBN: 978-981-16-0422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics