DOI QR코드

DOI QR Code

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

  • Received : 2022.02.05
  • Published : 2022.02.28

Abstract

The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.

Keywords

References

  1. A. Prakash, M. Satish, T. Sri Sai Bhargav, N. Bhalaji, Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture, Procedia Computer Science, Vol 87, 2016, pp. 275-280. https://doi.org/10.1016/j.procs.2016.05.161
  2. Distributed Denialof-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms in Advance Computing Conference, 2009. IACC 2009. IEEE International (2009), pp. 1275-1280
  3. Jonathan D. Fuller, Benjamin W. Ramsey, Mason J. Rice, John M. Pecarina, Misuse-based detection of Z-Wave network attacks, Computers & Security, Vol 64, 2017, pp 44-58, https://doi.org/10.1016/j.cose.2016.10.003
  4. Williams CM, Chaturvedi R, Chakravarthy K Cybersecurity Risks in a Pandemic J Med Internet Res 2020 vol. 22, no. 9, e23692 doi: 10.2196/23692
  5. Keskin, O.F.; Caramancion, K.M.; Tatar, I.; Raza, O.; Tatar, U. Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports. Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168
  6. Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. 2018. The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in Industry 101: 1-12. https://doi.org/10.1016/j.compind.2018.04.015
  7. S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014. https://doi.org/10.1109/JIOT.2014.2337336
  8. Lin, Shi-Wan, Brandford Miller, Jacques Durand, Graham Bleakley, Amine Chigani, Robert Martin, Brett Murphy, and Mark Crawford. 2019. The Industrial Internet of Things Volume G1: Reference Architecture V1.90. Industrial Internet Consortium, June. Accessed January 2022. https://www.iiconsortium.org/pdf/IIRA-v1.9.pdf
  9. J. Fuller, B. Ramsey, Rogue Z-Wave Controllers: A Persistent Attack Channel, in: 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), 2015, pp. 734-741
  10. B. Ramsey, B. Mullins, Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks, in: J. Butts, S. Shenoi (Eds.), Critical Infrastructure Protection VII, Vol. 417 of IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2013, pp. 63-79
  11. Gritzalis, D.; Stergiopoulos, G.; Vasilellis, E.; Anagnostopoulou, A. Readiness Exercises: Are Risk Assessment Methodologies Ready for the Cloud. In Advances in Core Computer Science-Based Technologies; Springer: Cham, Switzerland, 2021.
  12. Desnitsky, V.; Kotenko, I. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. In Econometrics for Financial Applications; Springer Science and Business Media LLC: Berlin, Germany, 2017; Volume 737, pp. 263-270.
  13. Noshina Tariq, Farrukh Aslam Khan, Muhammad Asim, Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis, Procedia Computer Science, Vol 191, 2021, pp 425-430, https://doi.org/10.1016/j.procs.2021.07.053..
  14. M. Tariq, H. Majeed, M.O. Beg, F.A. Khan, A. Derhab Accurate detection of sitting posture activities in a secure iot based assisted living environment Future Generation Computer Systems, 92 (2019), pp. 745-757 https://doi.org/10.1016/j.future.2018.02.013
  15. S. Shukla Reliable critical nodes detection for internet of things (iot) Wireless Networks, 27 (4) (2021), pp. 2931-2946 https://doi.org/10.1007/s11276-021-02603-4
  16. G. M. Koien, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011. https://doi.org/10.1007/s11277-011-0386-4
  17. Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021) https://doi.org/10.1007/s42452-021-04156-9
  18. Babaei A, Schiele G (2019) Physical unclonable functions in the Internet of Things: state of the art and open challenges. Sensors 19(14):3208 https://doi.org/10.3390/s19143208
  19. Om Kumar CU, Bhama PRKS (2019) Detecting and confronting flash attacks from IoT botnets. J Supercomput 75(12):8312-8338 https://doi.org/10.1007/s11227-019-03005-2
  20. Aldaej A (2019) Enhancing cyber security in modern Internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access. https://doi.org/10.1109/ACCESS.2019.2893445
  21. Alshehri MD, Hussain FK (2019) A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101(7):791-818 https://doi.org/10.1007/s00607-018-0685-7
  22. Yuchong Li, Qinghui Liu, A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, Energy Reports, Volume 7, 2021, Pages 8176-8186 https://doi.org/10.1016/j.egyr.2021.08.126
  23. Priyadarshini I., et al, Identifying cyber insecurities in trustworthy space and energy sector for smart grids, Comput. Electr. Eng., 93 (2021), Article 107204
  24. Ogbanufe O, Enhancing end-user roles in information security: Exploring the setting, situation, and identity, Comput Secur., 108 (2021), Article 102340.
  25. Niraja K.S., Srinivasa Rao S, A hybrid algorithm design for near real time detection cyber attacks from compromised devices to enhance IoT security, Mater. Today: Proc. (2021