Critical review attacks and countermeasures in internet of things enabled environments
-
2018-03-18 https://doi.org/10.14419/ijet.v7i2.7.10284 -
IoT, thing, Security Attack, Industry 4.0, Countermeasures, lightweight protocols. -
Abstract
Internet of Things (IoT) generally referred as Industry 4.0, Now a day’s Application Areas are everywhere like Smart Transportation, Smart Construction, Fitness monitoring, Energy Supervision, Construction managing, Environmental Supervise, Groceries supply chain. IoT has a compound network of smart nodes; information sending and receiving of nodes are through the Internet. In this process, it is vulnerable to attacks. In This paper, we review the possible attacks with respect to Cisco- Seven Layer model.
-
References
[1] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
[2] “The Internet of Things reference model," http://cdn.iotwf.com/resources/71/IoT Reference Model White Paper June 4 2014.pdf, accessed: 10-1-2016.
[3] D. M. Shila and V. Venugopal, “Design, implementation and security analysis of hardware Trojan threats in FPGA," in Proc. IEEE Int. Conf. Communications, 2014, pp. 719-724.
[4] M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detection," IEEE Design and Test of Computers, vol. 27, no. 1, pp. 10-25,2010.
[5] J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “ Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, vol. 1, p. 367, 2007.
[6] G. Padmavathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks," arXiv preprint arXiv: 0909.0576, 2009.
[7] A.Juels, “RFID security and privacy: A research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
[8] J. Westhues, “Hacking the prox card," RFID: Applications, Security, and Privacy,pp. 291-300, 2005.
[9] B. Grobauer, T. Walloschek, and E. Stocker, “ Understanding cloud computing vulnerabilities," IEEE Security Privacy, vol. 9, no. 2, pp. 50-57, Mar. 2011.
[10] Dr. Ch. Ramesh Kumar, Dr. Chalasani Srinivas, "`IOT Home Mechanization Frame work" International Journal of Civil Engineering and Technology, ISSN: 0976-6308 (Print) ISSN: 0976-6316 (Online) JAN 2018, Volume 9, Issue 1, pp. 929-936
[11] Industry 4.0, http://www.bitkom.org/74733.aspx.
[12] Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems (River Publishers Series in Communications) by Ovidiu Vermesan, PetterFriess
[13] A.Mosenia and N. K. Jha, “A comprehensive study of security of Internet of Things," IEEE Trans. Emerging Topics in Computing, DOI:10.1109/TETC.2016.2606384, 7 Sept., 2016.
[14] Y. Cherdantseva and J. Hilton, “A reference model of information assurance & security," in Proc. IEEE Int. Conf. Availability, Reliability and Security, 2013, pp. 546-555.
[15] M.Tanooj Kumar, S.L.Narayana Reddy, B.Katyayini, Sk.Shabana Azmi,†Optimized and secured storage approach for IoT based applications,â€, International Journal of Mechanical Engineering and Technology, ISSN 0976-6340, 8(12), (2017).
-
Downloads
-
How to Cite
Kumar Ch, M., & Kameswara Rao, M. (2018). Critical review attacks and countermeasures in internet of things enabled environments. International Journal of Engineering & Technology, 7(2.7), 163-167. https://doi.org/10.14419/ijet.v7i2.7.10284Received date: 2018-03-18
Accepted date: 2018-03-18
Published date: 2018-03-18