Fortifying IoT against crimpling cyber-attacks: a systematic review

Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir
{"title":"Fortifying IoT against crimpling cyber-attacks: a systematic review","authors":"Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir","doi":"10.33640/2405-609x.3329","DOIUrl":null,"url":null,"abstract":"The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday lives create exciting opportunities for human involvement, data integration, and seamless automation. This fully interconnected ecosystem considerably impacts crucial aspects of our lives, such as transportation, healthcare, energy management, and urban infrastructure. However, alongside the immense benefits, the widespread adoption of IoT also brings a complex web of security threats that can influence society, policy, and infrastructure conditions. IoT devices are particularly vulnerable to security violations, and industrial routines face potentially damaging vulnerabilities. To ensure a trustworthy and robust security framework, it is crucial to tackle the diverse challenges involved. This survey paper aims to aid researchers by categorizing attacks and vulnerabilities based on their targets. It provides a detailed analysis of attack methods and proposes effective countermeasures for each attack category. The paper also highlights case studies of critical IoT applications, showcasing security solutions. In addition to traditional cryptographic approaches, this work explores emerging technologies like Quantum Crypto Physical Unclonable Functions (QC-PUFs) and blockchain, discussing their pros and cons in securing IoT environments. The research identifies and examines attacks, vulnerabilities, and security measures and endeavors to impact the overall understanding of IoT security. The insights and findings presented here will serve as a valuable resource for researchers, guiding the development of resilient security mechanisms to ensure the trustworthy and safe operation of IoT ecosystems.","PeriodicalId":17782,"journal":{"name":"Karbala International Journal of Modern Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Karbala International Journal of Modern Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33640/2405-609x.3329","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday lives create exciting opportunities for human involvement, data integration, and seamless automation. This fully interconnected ecosystem considerably impacts crucial aspects of our lives, such as transportation, healthcare, energy management, and urban infrastructure. However, alongside the immense benefits, the widespread adoption of IoT also brings a complex web of security threats that can influence society, policy, and infrastructure conditions. IoT devices are particularly vulnerable to security violations, and industrial routines face potentially damaging vulnerabilities. To ensure a trustworthy and robust security framework, it is crucial to tackle the diverse challenges involved. This survey paper aims to aid researchers by categorizing attacks and vulnerabilities based on their targets. It provides a detailed analysis of attack methods and proposes effective countermeasures for each attack category. The paper also highlights case studies of critical IoT applications, showcasing security solutions. In addition to traditional cryptographic approaches, this work explores emerging technologies like Quantum Crypto Physical Unclonable Functions (QC-PUFs) and blockchain, discussing their pros and cons in securing IoT environments. The research identifies and examines attacks, vulnerabilities, and security measures and endeavors to impact the overall understanding of IoT security. The insights and findings presented here will serve as a valuable resource for researchers, guiding the development of resilient security mechanisms to ensure the trustworthy and safe operation of IoT ecosystems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
加强物联网抵御网络攻击:系统回顾
在我们的日常生活中,物联网(IoT)设备的快速增长和需求不断增加,为人类参与、数据集成和无缝自动化创造了令人兴奋的机会。这种完全互联的生态系统极大地影响了我们生活的关键方面,如交通、医疗、能源管理和城市基础设施。然而,除了巨大的好处之外,物联网的广泛采用也带来了复杂的安全威胁网络,这些威胁可能会影响社会、政策和基础设施条件。物联网设备特别容易受到安全违规的影响,工业惯例也面临着潜在的破坏性漏洞。为确保建立一个值得信赖和健全的安全框架,应对涉及的各种挑战至关重要。这篇调查论文的目的是帮助研究人员根据他们的目标对攻击和漏洞进行分类。对攻击方式进行了详细的分析,并针对每种攻击类型提出了有效的应对措施。本文还重点介绍了关键物联网应用的案例研究,展示了安全解决方案。除了传统的密码学方法外,这项工作还探讨了量子加密物理不可克隆功能(qc - puf)和区块链等新兴技术,讨论了它们在保护物联网环境中的利弊。该研究识别并检查了攻击、漏洞和安全措施,并努力影响对物联网安全的整体理解。本文提出的见解和发现将成为研究人员的宝贵资源,指导弹性安全机制的发展,以确保物联网生态系统的可靠和安全运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Karbala International Journal of Modern Science
Karbala International Journal of Modern Science Multidisciplinary-Multidisciplinary
CiteScore
2.50
自引率
0.00%
发文量
54
期刊最新文献
Freedom as the Physical Notion. Mechanics of a Material Point Enhanced optoelectronics performance of hybrid self power photodetectors GO: TiO2- AD / n-Si heterojunctions The Potential Influence of Immune Modulatory Molecules (TGF-βIII and CTLA-4) in Pathogenicity of PCOS Heterogeneous Resources in Infrastructures of the Edge Network Paradigm: A Comprehensive Review Classification and removal of hazy images based on a transmission fusion strategy using the Alexnet network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1