CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing IoT: Threats and Vulnerabilities

Published on May 2018 by Shubham Asthana, Rajiv Pandey
International Information Security Conference
Foundation of Computer Science USA
IISC2017 - Number 1
May 2018
Authors: Shubham Asthana, Rajiv Pandey
194ca2f5-2de0-4be2-915b-c5217c4c6c7a

Shubham Asthana, Rajiv Pandey . Securing IoT: Threats and Vulnerabilities. International Information Security Conference. IISC2017, 1 (May 2018), 12-16.

@article{
author = { Shubham Asthana, Rajiv Pandey },
title = { Securing IoT: Threats and Vulnerabilities },
journal = { International Information Security Conference },
issue_date = { May 2018 },
volume = { IISC2017 },
number = { 1 },
month = { May },
year = { 2018 },
issn = 0975-8887,
pages = { 12-16 },
numpages = 5,
url = { /proceedings/iisc2017/number1/29452-7018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Information Security Conference
%A Shubham Asthana
%A Rajiv Pandey
%T Securing IoT: Threats and Vulnerabilities
%J International Information Security Conference
%@ 0975-8887
%V IISC2017
%N 1
%P 12-16
%D 2018
%I International Journal of Computer Applications
Abstract

Internet of Things (IoT) is an emerging technology it is used for connection of not only computers or mobiles but also buildings, homes, household devices (air conditioner, fridge), fuel stations and for several other industrial purposes. It has also cast its effect on sectors like transportation, healthcare. The connection and communication of these devices, processes and data produces an enormous data set, which needs large datacenters and data warehouses for storage. IoT infrastructure and services needs a great security measure due to a wide and ever increasing attack surface, vast heterogeneity and complexity of dynamism of volumes. This paper explores the challenge involved in ubiquitous computing and the security complications, by providing an overview of threats and vulnerabilities in IoT enabled cyber-physical system. The overview could provide guidance for future work and research on IoT security and computational intelligence (involving encryption).

References
  1. Verizon (January, 2015). Create intelligent, more meaningful business connections. Retrieved from http://www. verizonenterprise. com/solutions/connected-machines/
  2. ERCIM news: Smart Cities Number 98 2014
  3. D. Kushner, "The Real Story of Stuxnet, How Kaspersky Lab trackeddown the malware that stymied Iran's nuclear-fuel enrichmentprogram", IEEE Spectrum,February 2013.
  4. The Internet of Things – Architecture : Final architectural reference model for the IoT v3. 0
  5. BRK1552 by,Kevin Miller, Principal Program Manager, Azure IoT
  6. Internet_of_ThingsfactsheetArchitecture
  7. On the Application of IOT (Internet of Things) for Securing Industrial Threats By: Muhammad Usman,National University of Sciences and Technology (NUST)
  8. "Internet of Things: How Much are We Exposed to Cyber Threats? - InfoSec Resources. " http://resources. infosecinstitute. com/internet-thingsmuch-exposed-cyber-threats/
  9. X. Bellekens, A. Seeam, K. Nieradzinska, C. Tachtatzis, A. Cleary, R. Atkinson, and I. Andonovic, "Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures. "
  10. S. Institute, "SANS InstituteInfoSec Reading Room tu-evolution, the history and Evolution of Intrusion Detection," 2001.
  11. N. T. T. Van and T. N. Thinh, "Accelerating Anomaly-Based IDS Using Neural Network on GPU," in 2015 International Conference on Advanced Computing and Applications (ACOMP), 2015.
  12. C. Han, Y. Lv, D. Yang, and Y. Hao, "An intrusion detection system based on neural network," in 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), 2011.
  13. Z. Li, W. Sun, and L. Wang, "A neural network based distributed intrusion detection system on cloud platform," in 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, 2012, vol. 01.
  14. V. Jaiganesh, P. Sumathi, and S. Mangayarkarasi, "An analysis of intrusion detection system using back propagation neural network," International Conference on Information Communication and Embedded Systems (ICICES), 2013.
  15. ISO/IEC 27005:2011 – Information technology – Security techniques – Information security risk management.
  16. ISO/IEC 27000:2014 – Information technology – Security techniques – Overview and vocabulary.
  17. A new approach to investigate IoT threats based on a four layer model
  18. Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System , by: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis and Robert Atkinson.
  19. "Internet of Things Strategic Research and Innovation Agenda" Ovidiu Vermesan et. al.
Index Terms

Computer Science
Information Sciences

Keywords

Iot Ubiquitous Computing Datacenter Data Ware Houses