Abstract
The Internet of Things (IoT) is one of the most extensive technological evolution of the computing network. This technology can transform the physical world into a virtual world for testing and emulation to evaluate the key issues present in the physical devices. This work aims to explore the security in IoT devices and demonstrates the security gaps in the behavior of the smart door lock. In this paper, we conducted two surveys to gather consumers’ requirements about the IoT devices as to whether they do understand the security risks involves with these devices. Further, we carried out a denial of service attack on a smart lock device to demonstrate that such devices are not secure. This work also highlights the security weakness and suggest guidelines to improve the overall system using cloud and edge computing and authentication and access control-based solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bhuvaneswari, V., Porkodi, R.: The internet of things (IoT) applications and communication enabling technology standards: an overview. In: International Conference on Intelligent Computing Applications, pp. 324–329 (2014)
Weber, R.: Internet of Things – new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review.In: Intern’l Conference on Computer Science & Electronics Engineering, pp. 648–651 (2012)
Wan, J., Yan, H., Suo, H., Li, F.: Advances in cyber-physical systems research. KSII Trans. Internet Inf. Syst. 5(11), 1891–1908 (2011)
Desai, P., Sheth, A., Anantharam, P.: Semantic gateway as a service architecture for IoT interoperability. In: IEEE International Conference on Mobile Services, pp. 313–319 (2015)
Divya, M., Rao, M.: Centralized authentication smart locking system using RFID, fingerprint, password and GSM. Int. J. Eng. Technol. 7(3.12), p. 516 (2018)
Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481–2501 (2014)
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Kumar, A., Petracca, G., Aksu, H., Jaeger, T., Uluagac, S.: A survey on sensor-based threats to internet-of-things (IoT) Devices and Applications. arXiv, vol. 14 no. 1, pp. 2–14 (2018)
Burhan, M., Rehman, R., Khan, B., Kim, B.: IoT elements, layered architectures and security issues: a comprehensive survey. Sensors 18(9), 2796 (2018)
Khan, R., Khan, S., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 10th International Conference on Frontiers of Information Technology, Islamabad, pp. 257–260 (2012)
Sethi, P., Sarangi, S.: Internet of things: architectures, protocols, and applications. J. of Electr. Comput. Eng. 20(9), 1–25 (2017)
Xiaohui, X.: Study on security problems and key technologies of the internet of things. In: International Conference on Computational and Information Sciences, pp. 407–410 (2013)
Saxena, N., Choi, B., Lu, R.: Authentication and authorization scheme for various user roles and devices in smart grid. IEEE TIFS 11(5), 907–921 (2016)
Prabhakar, S.: Network security in digitalization: attacks and defence. Int. J. Res. Comput. Appl. Rob. 5(5), 46–52 (2017)
Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutorials 18(3), 2027–2051 (2016)
Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)
Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of Things (IoT) communication protocols: review. In: 8th International Conference on Information Technology (ICIT), pp. 685–690 (2017)
Canzanese, R., Kam, M., Mancoridis, S.: Toward an automatic, online behavioral malware classification system. In: IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pp. 111–120 (2013)
Sharma, V., et al.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 17(1), 1–24 (2017)
Cai, Y., Genovese, A., Piuri, V., Scotti, F., Siegel, M.: IoT-based architectures for sensing and local data processing in ambient intelligence: research and industrial trends. In: IEEE International Instrumentation and Measurement Technology Conference, pp. 1–6 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Asad, B., Saxena, N. (2021). On the Feasibility of DoS Attack on Smart Door Lock IoT Network. In: Thampi, S.M., Wang, G., Rawat, D.B., Ko, R., Fan, CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore. https://doi.org/10.1007/978-981-16-0422-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-16-0422-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0421-8
Online ISBN: 978-981-16-0422-5
eBook Packages: Computer ScienceComputer Science (R0)