Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
2020 (English)In: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 22, no 1, p. 616-644, article id 8897627Article in journal (Refereed) Published
Abstract [en]
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: 'Passive Attacks' and 'Active Attacks'. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology.
Place, publisher, year, edition, pages
2020. Vol. 22, no 1, p. 616-644, article id 8897627
Keywords [en]
6LowPAN, 6LowPSec, 6TiSCH, Blockchain, CoAP, cryptography, detection, DoS, intrusion, IoT, MQTT, prevention, RPL, survey, TSCH, WSN
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:miun:diva-38774DOI: 10.1109/COMST.2019.2953364ISI: 000520934500021Scopus ID: 2-s2.0-85082167051OAI: oai:DiVA.org:miun-38774DiVA, id: diva2:1420915
2020-04-012020-04-012025-09-25Bibliographically approved