Critical review attacks and countermeasures in internet of things enabled environments

  • Authors

    • Mohan Kumar Ch
    • M Kameswara Rao
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10284
  • IoT, thing, Security Attack, Industry 4.0, Countermeasures, lightweight protocols.
  • Internet of Things (IoT) generally referred as Industry 4.0, Now a day’s Application Areas are everywhere like Smart Transportation, Smart Construction, Fitness monitoring, Energy Supervision, Construction managing, Environmental Supervise, Groceries supply chain. IoT has a compound network of smart nodes; information sending and receiving of nodes are through the Internet. In this process, it is vulnerable to attacks. In This paper, we review the possible attacks with respect to Cisco- Seven Layer model.

  • References

    1. [1] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.

      [2] “The Internet of Things reference model," http://cdn.iotwf.com/resources/71/IoT Reference Model White Paper June 4 2014.pdf, accessed: 10-1-2016.

      [3] D. M. Shila and V. Venugopal, “Design, implementation and security analysis of hardware Trojan threats in FPGA," in Proc. IEEE Int. Conf. Communications, 2014, pp. 719-724.

      [4] M. Tehranipoor and F. Koushanfar, “A survey of hardware Trojan taxonomy and detection," IEEE Design and Test of Computers, vol. 27, no. 1, pp. 10-25,2010.

      [5] J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “ Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, vol. 1, p. 367, 2007.

      [6] G. Padmavathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor networks," arXiv preprint arXiv: 0909.0576, 2009.

      [7] A.Juels, “RFID security and privacy: A research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.

      [8] J. Westhues, “Hacking the prox card," RFID: Applications, Security, and Privacy,pp. 291-300, 2005.

      [9] B. Grobauer, T. Walloschek, and E. Stocker, “ Understanding cloud computing vulnerabilities," IEEE Security Privacy, vol. 9, no. 2, pp. 50-57, Mar. 2011.

      [10] Dr. Ch. Ramesh Kumar, Dr. Chalasani Srinivas, "`IOT Home Mechanization Frame work" International Journal of Civil Engineering and Technology, ISSN: 0976-6308 (Print) ISSN: 0976-6316 (Online) JAN 2018, Volume 9, Issue 1, pp. 929-936

      [11] Industry 4.0, http://www.bitkom.org/74733.aspx.

      [12] Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems (River Publishers Series in Communications) by Ovidiu Vermesan, PetterFriess

      [13] A.Mosenia and N. K. Jha, “A comprehensive study of security of Internet of Things," IEEE Trans. Emerging Topics in Computing, DOI:10.1109/TETC.2016.2606384, 7 Sept., 2016.

      [14] Y. Cherdantseva and J. Hilton, “A reference model of information assurance & security," in Proc. IEEE Int. Conf. Availability, Reliability and Security, 2013, pp. 546-555.

      [15] M.Tanooj Kumar, S.L.Narayana Reddy, B.Katyayini, Sk.Shabana Azmi,†Optimized and secured storage approach for IoT based applications,â€, International Journal of Mechanical Engineering and Technology, ISSN 0976-6340, 8(12), (2017).

  • Downloads

  • How to Cite

    Kumar Ch, M., & Kameswara Rao, M. (2018). Critical review attacks and countermeasures in internet of things enabled environments. International Journal of Engineering & Technology, 7(2.7), 163-167. https://doi.org/10.14419/ijet.v7i2.7.10284