{"title":"分层物联网生态系统中的安全问题、攻击与对策","authors":"Ajeet Singh, N D Patel","doi":"10.47164/ijngc.v14i2.892","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuationcapabilities, working collaboratively to provide a specific functionality. IoT applications are becoming vital part ofour daily lives in various areas such as home automation, industrial automation, energy sector, healthcare sectorand smart transportation. Security is a term that is used to encompass the notions such as integrity, confidentiality,and privacy. A more prominent understanding of the Internet of Things (IoT) is that – it transmits data over theglobal internet and gives many services in many domains. It facilitates the machines and gadgets to communicatewith each other. IoT appliances have been facing several issues, therefore we identify variety of service domainsand their vulnerabilities. The main focus is on protecting the security and privacy. This paper presents anoverview of IoT models, applications in different domains, vulnerabilities, security privacy goals, possible attacks,and their corresponding countermeasures. The objective of this paper is also to provide a survey on categorizedlayer-wise attacks and countermeasures in detail. In the object layer, connectivity link Layer, several attacksare discussed based on RFID, NFC, ZigBee, Bluetooth, and Wi-Fi protocols. In the Transport Network layer,we have classified variety of attacks based on RPL, 6loWPAN, TCP/UDP, and IPv4/IPv6. Similarly, In theSession Communication, Data Aggregation Storage, Business Model, and Application layers, we have discoveredconsiderable number of attacks for each layer.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"36 1","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem\",\"authors\":\"Ajeet Singh, N D Patel\",\"doi\":\"10.47164/ijngc.v14i2.892\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuationcapabilities, working collaboratively to provide a specific functionality. IoT applications are becoming vital part ofour daily lives in various areas such as home automation, industrial automation, energy sector, healthcare sectorand smart transportation. Security is a term that is used to encompass the notions such as integrity, confidentiality,and privacy. A more prominent understanding of the Internet of Things (IoT) is that – it transmits data over theglobal internet and gives many services in many domains. It facilitates the machines and gadgets to communicatewith each other. IoT appliances have been facing several issues, therefore we identify variety of service domainsand their vulnerabilities. The main focus is on protecting the security and privacy. This paper presents anoverview of IoT models, applications in different domains, vulnerabilities, security privacy goals, possible attacks,and their corresponding countermeasures. The objective of this paper is also to provide a survey on categorizedlayer-wise attacks and countermeasures in detail. In the object layer, connectivity link Layer, several attacksare discussed based on RFID, NFC, ZigBee, Bluetooth, and Wi-Fi protocols. In the Transport Network layer,we have classified variety of attacks based on RPL, 6loWPAN, TCP/UDP, and IPv4/IPv6. Similarly, In theSession Communication, Data Aggregation Storage, Business Model, and Application layers, we have discoveredconsiderable number of attacks for each layer.\",\"PeriodicalId\":42021,\"journal\":{\"name\":\"International Journal of Next-Generation Computing\",\"volume\":\"36 1\",\"pages\":\"\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2023-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Next-Generation Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47164/ijngc.v14i2.892\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Next-Generation Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47164/ijngc.v14i2.892","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem
Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuationcapabilities, working collaboratively to provide a specific functionality. IoT applications are becoming vital part ofour daily lives in various areas such as home automation, industrial automation, energy sector, healthcare sectorand smart transportation. Security is a term that is used to encompass the notions such as integrity, confidentiality,and privacy. A more prominent understanding of the Internet of Things (IoT) is that – it transmits data over theglobal internet and gives many services in many domains. It facilitates the machines and gadgets to communicatewith each other. IoT appliances have been facing several issues, therefore we identify variety of service domainsand their vulnerabilities. The main focus is on protecting the security and privacy. This paper presents anoverview of IoT models, applications in different domains, vulnerabilities, security privacy goals, possible attacks,and their corresponding countermeasures. The objective of this paper is also to provide a survey on categorizedlayer-wise attacks and countermeasures in detail. In the object layer, connectivity link Layer, several attacksare discussed based on RFID, NFC, ZigBee, Bluetooth, and Wi-Fi protocols. In the Transport Network layer,we have classified variety of attacks based on RPL, 6loWPAN, TCP/UDP, and IPv4/IPv6. Similarly, In theSession Communication, Data Aggregation Storage, Business Model, and Application layers, we have discoveredconsiderable number of attacks for each layer.