IOT Security Challenges and Measures to Mitigate: Novel Perspectives

  • Authors

    • Manas Kumar Yogi
    • Y Himatej
    • M Mahesh reddy
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.11081
  • DDOS (Distributed Denial of Service), GPS (Global Positioning system), IOT (Internet of things), MAM (Masked Authenticated Messaging)
  • The Internet Of Things describes the ever-growing number of intelligent objects that are being connected to the internet and each other, smartphones, tablets, wearable technology and smart home devices are adopted into our everyday lives. The security of IOT is becoming more complex and may have a serious consequence. So, now we have many security challenges like privacy concerns, routine cryptography, passive data collection etc. Many people hide personal data in social media to eliminate these sort of privacy issues but common man nowadays is becoming a passive participant due to lack of security in these IOT devices that are surrounding us.

  • References

    1. [1] Gartner, Inc., “Gartner says 8.4 billion connected â€things†will be in use in 2017, up 31 percent from 2016,†(cited Oct. 10, 2017). [Online].Available:http://www.gartner.com/newsroom/id/3598917.

      [2] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: Mirai and other botnets,†IEEE Computer, vol. 50, no. 7, pp. 80–84, 2017.

      [3] X. Sun and N. Ansari, “EdgeIoT: Mobile edge computing for the Internet of things,†IEEE Communications Magazine, vol. 54, no. 12, pp. 22–29, 2016.

      [4] T. Kohonen, “Essentials of the self-organizing map,†Neural networks, vol. 37, pp. 52–65, 2013.

      [5] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on Internet of things: architecture, enabling technologies, security and privacy, and applications,†IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, 2017.

      [6] F. Alam, R. Mehmood, I. Katib, N. Albogami, and A. Albeshri, “Data fusion and IoT for smart ubiquitous environments: A survey,†IEEE Access, vol. 5, pp. 9533–9554, 2017.

      [7] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge computing – A key technology towards 5G,†ETSI White Paper No. 11, 2015.

      [8] A. Aleroud and G. Karabatis, “Contextual information fusion for intrusion detection: a survey and taxonomy,†Knowledge and Information Systems, vol. 52, no. 3, pp. 563–619, 2017.

      [9] D. Anstee, P. Bowen, C. F. Chui, and G. Sockrider, “Worldwideinfrastructure security report,†Arbort Networks special report – Volume XII, 2017.

      [10] E. Leverett and A. Kaplan, “Towards estimating the untapped potential: a global malicious DDoS mean capacity estimate,†Journal of Cyber Policy, vol. 2, no. 2, pp. 195–208, 2017.

      [11] S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks,†IEEE Communications Surveys Tutorials, vol. 15, no. 4, pp. 2046–2069, Fourth 2013.

      [12] T. V. Phan, N. K. Bao, and M. Park, “Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks,†Journal of Network and Computer Applications, vol. 91, pp. 14–25, 2017.

      [13] CAIDA, “The CAIDA datasets of anonymized Internet tracesand DDoS attack,†(cited Sep. 10, 2017). [Online]. Available:

      https://data.caida.org/datasets/
  • Downloads

  • How to Cite

    Kumar Yogi, M., Himatej, Y., & Mahesh reddy, M. (2018). IOT Security Challenges and Measures to Mitigate: Novel Perspectives. International Journal of Engineering & Technology, 7(2.7), 854-858. https://doi.org/10.14419/ijet.v7i2.7.11081