Cyber Security Challenges and Attacks and Countermeasures for IoT-Based Smart Home

Altaf Hussain, Amir Hussain, Shah Marjan, Mehmood Baryalai, Zubair Zaland, Abdul Wahid, Shumaila Hussain

Abstract


The Internet of Things is a distributed network of things connected by sensors and RFID tags that exchange information. The internet of things can work without human assistance, which increases security challenges. The IoT infrastructure allows people to live in smart homes, and their businesses are growing thanks to smart cities, smart industries, and smart healthcare. The prevalence of sensitive data and infrastructure increases security concerns. IoT devices face a number of challenges in terms of security and privacy, including improper device updates. Additionally, there is a lack of robust security protocols, a lack of awareness among users, and an absence of monitoring. This paper focuses on IoT security and privacy measures identified as security and privacy issues in IoT networks. This research work also discusses the approaches used, security solutions implemented, as well as appropriate privacy models for all types of layers of IoT, Architecture, Cyber Security challenges, Security Policies, Privacy, and countermeasures.


Full Text:

PDF

References


Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences (Basel, Switzerland), 10(12), 4102. https://doi.org/10.3390/app10124102

A., M., & T., S. (2015). Internet of things: Architecture, security issues and countermeasures. International Journal of Computer Applications, 125(14), 1–4. https://doi.org/10.5120/ijca2015906251

H. Ahmad, “Utilizing blockchain technology to enhance smart home security and privacy,” in International Conference on Information Technology

(Basel, Switzerland), 12(3), 1598 https://doi.org/10.3390/app12031598

Mohamad Noor, M. B., & Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer Networks, 148, 283–294. https://doi.org/10.1016/j.comnet.2018.11.025

Alhalafi, N., & Veeraraghavan, P. (2019). Privacy and Security Challenges and Solutions in IOT: A review. IOP Conference Series. Earth and Environmental Science, 322(1), 012013. https://doi.org/10.1088/1755-1315/322/1/012013

Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information (Basel), 7(3), 44. https://doi.org/10.3390/info7030044

IoT security challenges and counters measures. (2019). International Journal of Recent Technology and Engineering, 8(3), 1519–1528. https://doi.org/10.35940/ijrte.c4212.098319

Litoussi, M., Kannouf, N., El Makkaoui, K., Ezzati, A., & Fartitchou, M. (2020). IoT security: challenges and countermeasures. Procedia Computer Science, 177, 503–508. https://doi.org/10.1016/j.procs.2020.10.069

Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and countermeasures. International Journal for Information Security Research, 5(4), 608–616. https://doi.org/10.20533/ijisr.2042.4639.2015.0070

Siby, S., Maiti, R. R., & Tippenhauer, N. O. (2017). IoTScanner: Detecting privacy threats in IoT neighborhoods. Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security.

Leloglu, E. (2017). A review of security concerns in internet of things. Journal of Computer and Communications, 05(01), 121–136. https://doi.org/10.4236/jcc.2017.51010

Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28.

Burhan, M., Rehman, R. A., Khan, B., & Kim, B.-S. (2018). IoT elements, layered architectures and security issues: A comprehensive survey. Sensors (Basel, Switzerland), 18(9). https://doi.org/10.3390/s18092796

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F., & Al Ali, A. R. (2015). Smart grid cyber security: Challenges and solutions. 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).

Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2021). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016

Tan, S. F., & Samsudin, A. (2021). Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey. Sensors (Basel, Switzerland), 21(19), 6647. https://doi.org/10.3390/s21196647

[Millar, S. (2021). IoT Security Challenges and Mitigations: An Introduction. In arXiv [cs.CR]. http://arxiv.org/abs/2112.14618

Khanam, S., Ahmedy, I. B., Idna Idris, M. Y., Jaward, M. H., & Bin Md Sabri, A. Q. (2020). A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access: Practical Innovations, Open Solutions, 8, 219709–219743. https://doi.org/10.1109/access.2020.3037359

Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185. https://doi.org/10.1007/s11277-017-4434-6

Hasan, N., Chamoli, A., & Alam, M. (2020). Privacy Challenges and Their Solutions in IoT. In Internet of Things (IoT) (pp. 219–231). Springer International Publishing.

Tabassum, I., Bazai, S. U., Zaland, Z., Marjan, S., Khan, M. Z., & Ghafoor, M. I. (2022). Cyber Security’s Silver Bullet-A Systematic Literature Review of AI-Powered Security. 2022 3rd International Informatics and Software Engineering Conference (IISEC), 1–7. IEEE.

Bazai, S. U., & Jang-Jaccard, J. (2019). SparkDA: RDD-based high-performance data anonymization technique for Spark platform. International Conference on Network and System Security, 646–662. Springer, Cham.

Bazai, S. U., Jang-Jaccard, J., & Zhang, X. (2017). A privacy preserving platform for MapReduce. International Conference on Applications and Techniques in Information Security, 88–99. Springer, Singapore.

Bazai, S. U., Jang-Jaccard, J., & Alavizadeh, H. (2021a). A novel hybrid approach for multi-dimensional data anonymization for apache spark. ACM Transactions on Privacy and Security, 25(1), 1–25.

Tareen, S., Bazai, S. U., Ullah, S., Ullah, R., Marjan, S., & Ghafoor, M. I. (2022). Phishing and Intrusion Attacks: An Overview of Classification Mechanisms. 2022 3rd International Informatics and Software Engineering Conference (IISEC), 1–5. IEEE.

Zaland, Z., Bazai, S. U., Marjan, S., & Ashraf, M. (2021). Three-Tier Password Security Algorithm for Online Databases. 2021 2nd International Informatics and Software Engineering Conference (IISEC), 1–6. IEEE.




DOI: http://dx.doi.org/10.36785/jaes.122563

Creative Commons License
Journal of Applied and Emerging Sciences by BUITEMS is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at www.buitms.edu.pk.
Permissions beyond the scope of this license may be available at http://journal.buitms.edu.pk/j/index.php/bj

Contacts | Feedback
© 2002-2014 BUITEMS