International Research Journal of Engineering and Technology (IRJET) Volume: 07 Issue: 04 | Apr 2020
e-ISSN: 2395-0056 p-ISSN: 2395-0072
www.irjet.net
A Survey on IoT Security and its Vulnerabilities with First Empirical Look on Internet-scale IoT Exploitations John Bennet J Department of Computer Science and Engineering, Bethlahem Institute of Engineering, Karungal, Tamilnadu, India. ----------------------------------------------------------------------------***--------------------------------------------------------------------------
Abstract- The security issue impacting the Internet-of- with warning systems prevent ecological disasters. Indeed, a
Things (IoT) paradigm has recently attracted significant number of case-studies have reported on the significant attention from the research community. In this context, we impact of IoT on natural resources’ integrity and initially provide a comprehensive classification of state-of- consumption. the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by The undeniable benefits proposed by the IoT paradigm, amalgamating, comparing and contrasting dispersed research nevertheless, are coupled with serious security flaws. Profitcontributions. Subsequently, we provide a unique driven businesses and time-to-market along with the taxonomy, which sheds the light on IoT vulnerabilities, shortage of related legislation have stimulated their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, manufacturers to overlook security considerations and to corresponding remediation methodologies and currently design potentially vulnerable IoT devices, opening the door offered operational cyber security capabilities to infer and for adversaries, which often exploit such devices with little monitor such weaknesses. Additionally, motivated by the lack or no effort. Moreover, poorly designed devices allow the of empirical (and malicious) data related to the IoT paradigm, execution of arbitrary commands and re-programming of this work also presents a first look on Internet-scale IoT device firmware. Among the many cases that recently exploitations by drawing upon more than 1.2 GB of attracted the public attention, the cyber attack provides a macroscopic, passive measurements’ data. Insightful findings, clear example of the severity of the threat caused by inferences and outcomes in addition to open challenges and incrementing exploited IoT devices. research problems are also disclosed in this work, which we hope would pave the way for future research endeavors While the disclosure of private and confidential addressing theoretical and empirical aspects related to the information coupled with the launch of debilitating DoS imperative topic of IoT security. attacks cause various privacy violations and business Index Terms—Internet of Things, IoT Vulnerabilities, IoT disruptions, the most significant danger from exposed IoT Data, IoT Security, Network Security devices remains the threat to people’s lives and well-being. While benefits from using these IoT devices and corresponding technologies possibly outweigh the risks, 1. INTRODUCTION undoubtedly, IoT security at large should be carefully and promptly addressed. People-centric IoT solutions, for instance, significantly enhance daily routines of elderly and disabled Several technical difficulties, including limited storage, people, thus increasing their autonomy and self-confidence. power, and computational capabilities, challenge addressing Implantable and wearable IoT devices monitor and extract various IoT security requirements. For instance, the simple vital measurements to enable the real-time emergency issue of unauthorized access to IoT devices by applying alerting in order to increase patients’ chances of survival. This default user credentials remains largely unsolved. IoT emerging technology is also being leveraged to reduce manufacturers, though aware of this flaw, do not mitigate this response times in reacting to abrupt health incidents such as risk by design, making consumers take responsibility of this the sudden infant death syndrome during sleep. technical task and to update their device firmware. Safety-centric IoT solutions endeavor to minimize hazardous scenarios and situations. For example, the concept of connected vehicles prevents the driver from deviating from proper trajectory paths or bumping into objects. Moreover, IoT sensors at factories monitor environmental pollution and chemical leaks in water supply, while smoke, toxic gases and temperature sensors coupled
© 2020, IRJET
|
Impact Factor value: 7.529|
2. RELATED SURVEYS The rapid growth and adoption of the IoT paradigm have induced enormous attention from the research community. To highlight the latest findings and research directions in such an evolving field, a plethora of surveys were put forward to
ISO 9001:2008 Certified Journal
|
Page 2788