Critical review attacks and countermeasures in internet of things enabled environments

  • Authors

    • Mohan Kumar Ch
    • M Kameswara Rao
    https://doi.org/10.14419/ijet.v7i2.7.10284

    Received date: March 18, 2018

    Accepted date: March 18, 2018

    Published date: March 18, 2018

  • IoT, thing, Security Attack, Industry 4.0, Countermeasures, lightweight protocols.
  • Abstract

    Internet of Things (IoT) generally referred as Industry 4.0, Now a day’s Application Areas are everywhere like Smart Transportation, Smart Construction, Fitness monitoring, Energy Supervision, Construction managing, Environmental Supervise, Groceries supply chain. IoT has a compound network of smart nodes; information sending and receiving of nodes are through the Internet. In this process, it is vulnerable to attacks. In This paper, we review the possible attacks with respect to Cisco- Seven Layer model.

  • References

    1. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010.
    2. “The Internet of Things reference model," http://cdn.iotwf.com/resources/71/IoT Reference Model White Paper June 4 2014.pdf, accessed: 10-1-2016.
    3. D. M. Shila and V. Venugopal, “Design, implementation and se-curity analysis of hardware Trojan threats in FPGA," in Proc. IEEE Int. Conf. Communications, 2014, pp. 719-724.
    4. M. Tehranipoor and F. Koushanfar, “A survey of hardware Tro-jan taxonomy and detection," IEEE Design and Test of Comput-ers, vol. 27, no. 1, pp. 10-25,2010.
    5. J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “ Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, vol. 1, p. 367, 2007.
    6. G. Padmavathi and D. Shanmugapriya, “A survey of attacks, se-curity mechanisms and challenges in wireless sensor networks," arXiv preprint arXiv: 0909.0576, 2009.
    7. A.Juels, “RFID security and privacy: A research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
    8. J. Westhues, “Hacking the prox card," RFID: Applications, Secu-rity, and Privacy,pp. 291-300, 2005.
    9. B. Grobauer, T. Walloschek, and E. Stocker, “ Understanding cloud computing vulnerabilities," IEEE Security Privacy, vol. 9, no. 2, pp. 50-57, Mar. 2011.
    10. Dr. Ch. Ramesh Kumar, Dr. Chalasani Srinivas, "`IOT Home Mechanization Frame work" International Journal of Civil Engi-neering and Technology, ISSN: 0976-6308 (Print) ISSN: 0976-6316 (Online) JAN 2018, Volume 9, Issue 1, pp. 929-936
    11. Industry 4.0, http://www.bitkom.org/74733.aspx.
    12. Internet of Things: Converging Technologies for Smart Environ-ments and Integrated Ecosystems (River Publishers Series in Communications) by Ovidiu Vermesan, Petter Friess
    13. A.Mosenia and N. K. Jha, “A comprehensive study of security of Internet of Things," IEEE Trans. Emerging Topics in Computing, DOI:10.1109/TETC.2016.2606384, 7 Sept., 2016.
    14. Y. Cherdantseva and J. Hilton, “A reference model of infor-mation assurance & security," in Proc. IEEE Int. Conf. Availabil-ity, Reliability and Security, 2013, pp. 546-555.
    15. M.Tanooj Kumar, S.L.Narayana Reddy, B.Katyayini, Sk.Shabana Azmi,” Optimized and secured storage approach for IoT based applications,”, International Journal of Mechanical En-gineering and Technology, ISSN 0976-6340, 8(12), (2017).
  • Downloads

  • How to Cite

    Kumar Ch, M., & Kameswara Rao, M. (2018). Critical review attacks and countermeasures in internet of things enabled environments. International Journal of Engineering and Technology, 7(2.7), 163-167. https://doi.org/10.14419/ijet.v7i2.7.10284