Critical review attacks and countermeasures in internet of things enabled environments
-
https://doi.org/10.14419/ijet.v7i2.7.10284
Received date: March 18, 2018
Accepted date: March 18, 2018
Published date: March 18, 2018
-
IoT, thing, Security Attack, Industry 4.0, Countermeasures, lightweight protocols. -
Abstract
Internet of Things (IoT) generally referred as Industry 4.0, Now a day’s Application Areas are everywhere like Smart Transportation, Smart Construction, Fitness monitoring, Energy Supervision, Construction managing, Environmental Supervise, Groceries supply chain. IoT has a compound network of smart nodes; information sending and receiving of nodes are through the Internet. In this process, it is vulnerable to attacks. In This paper, we review the possible attacks with respect to Cisco- Seven Layer model.
-
References
- L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
- “The Internet of Things reference model," http://cdn.iotwf.com/resources/71/IoT Reference Model White Paper June 4 2014.pdf, accessed: 10-1-2016.
- D. M. Shila and V. Venugopal, “Design, implementation and se-curity analysis of hardware Trojan threats in FPGA," in Proc. IEEE Int. Conf. Communications, 2014, pp. 719-724.
- M. Tehranipoor and F. Koushanfar, “A survey of hardware Tro-jan taxonomy and detection," IEEE Design and Test of Comput-ers, vol. 27, no. 1, pp. 10-25,2010.
- J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “ Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, vol. 1, p. 367, 2007.
- G. Padmavathi and D. Shanmugapriya, “A survey of attacks, se-curity mechanisms and challenges in wireless sensor networks," arXiv preprint arXiv: 0909.0576, 2009.
- A.Juels, “RFID security and privacy: A research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
- J. Westhues, “Hacking the prox card," RFID: Applications, Secu-rity, and Privacy,pp. 291-300, 2005.
- B. Grobauer, T. Walloschek, and E. Stocker, “ Understanding cloud computing vulnerabilities," IEEE Security Privacy, vol. 9, no. 2, pp. 50-57, Mar. 2011.
- Dr. Ch. Ramesh Kumar, Dr. Chalasani Srinivas, "`IOT Home Mechanization Frame work" International Journal of Civil Engi-neering and Technology, ISSN: 0976-6308 (Print) ISSN: 0976-6316 (Online) JAN 2018, Volume 9, Issue 1, pp. 929-936
- Industry 4.0, http://www.bitkom.org/74733.aspx.
- Internet of Things: Converging Technologies for Smart Environ-ments and Integrated Ecosystems (River Publishers Series in Communications) by Ovidiu Vermesan, Petter Friess
- A.Mosenia and N. K. Jha, “A comprehensive study of security of Internet of Things," IEEE Trans. Emerging Topics in Computing, DOI:10.1109/TETC.2016.2606384, 7 Sept., 2016.
- Y. Cherdantseva and J. Hilton, “A reference model of infor-mation assurance & security," in Proc. IEEE Int. Conf. Availabil-ity, Reliability and Security, 2013, pp. 546-555.
- M.Tanooj Kumar, S.L.Narayana Reddy, B.Katyayini, Sk.Shabana Azmi,” Optimized and secured storage approach for IoT based applications,”, International Journal of Mechanical En-gineering and Technology, ISSN 0976-6340, 8(12), (2017).
-
Downloads
-
How to Cite
Kumar Ch, M., & Kameswara Rao, M. (2018). Critical review attacks and countermeasures in internet of things enabled environments. International Journal of Engineering and Technology, 7(2.7), 163-167. https://doi.org/10.14419/ijet.v7i2.7.10284
