A Study On The Internet Of Things And Cyber Security With Intruders And Attacks

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2019 by IJPTT Journal
Volume-9 Issue-3
Year of Publication : 2019
Authors : Dr. I.Lakshmi


MLA Style: Dr. I.Lakshmi "A Study On The Internet Of Things And Cyber Security With Intruders And Attacks" International Journal of P2P Network Trends and Technology 9.3 (2019): 4-13.

APA Style:Dr. I.Lakshmi (2019). A Study On The Internet Of Things And Cyber Security With Intruders And AttacksInternational Journal of P2P Network Trends and Technology, 9(3), 4-13.


Internets of Things (IoT) units are swiftly becoming thoroughgoing while IoT functions are becoming pervasive. Their advancement has now not long past ignored and the quantity over threats or attacks towards IoT devices yet functions are about the increase namely well. Cyber-attacks are no longer latter in conformity with IoT, but so IoT intention keep deep interwoven among our lives yet societies, that is turning into essential in conformity with bottom up yet absorb cyber defence seriously. Hence, like is a real need after tightly closed IoT, who has as a result begotten of a need according to comprehensively, recognize the threats or attacks on IoT infrastructure. This demand bill is and strive in conformity with classify hazard types, barring analyze then signify intruders then assaults going through IoT devices and services.


[1] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[2] S. Andreev and Y. Koucheryavy, “Internet of things, smart spaces, and next generation networking,” Springer, LNCS, vol. 7469, p. 464, 2012.
[3] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 20–26, March 2014, published by Foundation of Computer Science, New York, USA.
[4] Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat analysis methodology for security evaluation and enhancement planning,” in Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09. Third International Conference on. IEEE, 2009, pp. 262–267.
[5] D. Jiang and C. ShiWei, “A study of information security for m2m of iot,” in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–576.
[6] Schneier, Secrets and lies: digital security in a networked world. John Wiley & Sons, 2011.
[7] J. M. Kizza, Guide to Computer Network Security. Springer, 2013.
[8] M. Taneja, “An analytics framework to detect compromised iot devices using mobility behavior,” in ICT Convergence (ICTC), 2013 International Conference on. IEEE, 2013, pp. 38–43.
[9] M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in Communications-Problems, Technology and Solutions. River Publishers, 2013.
[10] N. R. Prasad, “Threat model framework and methodology for personal networks (pns),” in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on. IEEE, 2007, pp. 1–6.
[11] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al. “Internet of things strategic research roadmap,” Internet of Things-Global Technological and Societal Trends, pp. 9–52, 2011.
[12] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for the internet of things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955.
[13] Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with heterogeneous iot devices through transformation,” 2014.
[14] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
[15] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s intranet of things to a future internet of things: a wireless-and mobility-related view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44–51, 2010.
[16] Hongsong, F. Zhongchuan, and Z. Dongyan, “Security and trust research in m2m system,” in Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on. IEEE, 2011, pp. 286–290.
[17] Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein, “Trust in m2m communication,” Vehicular Technology Magazine, IEEE, vol. 4, no. 3, pp. 69–75, 2009.
[18] Lopez, R. Roman, and C. Alcaraz, “Analysis of security threats, requirements, technologies and standards in wireless sensor networks,” 84 M. Abomhara and G. M. Køien in Foundations of Security Analysis and Design V. Springer, 2009, pp. 289–338.
[19] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
[20] Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, “Privacy in machine-to-machine communications a state-of-the-art survey,” in Communication Systems (ICCS), 2012 IEEE International Conference on. IEEE, 2012, pp. 75–79.
[21] M. Rudner, “Cyber-threats to critical national infrastructure: An intelligence challenge,” International Journal of Intelligence and Counter Intelligence, vol. 26, no. 3, pp. 453–481, 2013.
[22] R. Kozik and M. Choras, “Current cyber security threats and challenges in critical infrastructures protection,” in Informatics and Applications (ICIA), 2013 Second International Conference on. IEEE, 2013, pp. 93–97.
[23] P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object classification based context management for identity management in internet of things,” International Journal of Computer Applications, vol. 63, no. 12, pp. 1–6, 2013.
[24] Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, “A survey on facilities for experimental internet of things research,” Communications Magazine, IEEE, vol. 49, no. 11, pp. 58–67, 2011.
[25] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L. Gurgen, “Sharing user iot devices in the cloud,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.
[26] G. M. Køien, “Reflections on trust in devices: an informal survey of human trust in an internet-of-things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.
[27] Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.
[28] M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T. Braun, “On iot services: Survey, classification and enterprise integration,” in Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE, 2012, pp. 257–260.
[29] M. Abomhara and G. Koien, “Security and privacy in the internet of things: Current status and open issues,” in PRISMS 2014 The 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014.
[30] D.Watts, “Security and vulnerability in electric power systems,” in 35thNorth American power symposium, vol. 2, 2003, pp. 559–566.
[31] L. Pipkin, Information security. Prentice Hall PTR, 2000.
[32] Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini, “Web services threats, vulnerabilities, and countermeasures,” in Securityfor Web Services and Service-Oriented Architectures. Springer, 2010, pp. 25–44.
[33] D. G. Padmavathi, M. Shanmugapriya et al., “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” arXivpreprint arXiv:0909.0576, 2009.
[34] G. Brauch, “Concepts of security threats, challenges, vulnerabilities and risks,” in Coping with Global Environmental Change, Disasters and Security. Springer, 2011, pp. 61–106.
[35] Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing,” in Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. ACM, 2011, p. 12.
[36] R. K. Rainer and C. G. Cegielski, Introduction to information systems: Enabling and transforming business. JohnWiley & Sons, 2010.
[37] J. Duncan, S. Creese, and M. Goldsmith, “Insider attacks in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012, pp. 857–862.
[38] P. Baybutt, “Assessing risks from threats to process plants: Threat and vulnerability analysis,” Process Safety Progress, vol. 21, no. 4, pp. 269–275, 2002.
[39] C. Tankard, “Advanced persistent threats and how to monitor and deter them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011.
[40] F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent threat: Acase study of malware for political espionage,” in Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on. IEEE,2011, pp. 102–109.
[41] S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet sniffing: a brief introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.
[42] M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A review of port scanning techniques,” ACM SIGCOMM Computer Communication Review, vol. 29, no. 2, pp. 41–48, 1999.
[43] Naumann and G. Hogben, “Privacy features of european eid card specifications,” Network Security, vol. 2008, no. 8, pp. 9–13, 2008.
[44] C.Wilson, “Botnets, cybercrime, and cyberterrorism:Vulnerabilities and policy issues for congress.” DTIC Document, 2008.
[45] Daneels and W. Salter, “What is scada,” in International Conference on Accelerator and Large Experimental Physics Control Systems, 1999, pp. 339–343.
[46] Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, “Scada security in the light of cyber-warfare,” Computers & Security, vol. 31, no. 4, pp. 418–436, 2012.
[47] V. M. Igure, S. A. Laughter, and R. D.Williams, “Security issues in scada networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, 2006.
[48] M. Kelleye, “Business Insider. The Stuxnet attack on Irans Nuclear Plant was Far more Dangerous Than Previously Thought,” http://www.businessinsider.com/stuxnet-was-far-more-dangerous-thanprevious- thought-2013-11/,2013, [Online; accessed 03-Sep-2014].
[49] Jung, I. Han, and S. Lee, “Security threats to internet: a Korean multi-industry investigation,” Information & Management, vol. 38, no. 8, pp. 487–498, 2001.
[50] P. Mayer, “Security and privacy challenges in the internet of things,” Electronic Communications of the EASST, vol. 17, 2009.
[51] R. Beresford, “Location privacy in ubiquitous computing,” Computer Laboratory, University of Cambridge, Tech. Rep, vol. 612,2005.
[52] S. Pramanik, “Threat motivation,” in Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on. IEEE, 2013, pp. 1–5.
[53] Dolev and A. C. Yao, “On the security of public key protocols,” Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198–208,1983.
[54] Cervesato, “The dolev-yao intruder is the most powerful attacker,” in 16th Annual Symposium on Logic in Computer ScienceLICS, vol. 1. Citeseer, 2001.
[55] Sheldon, “State of the art: Attackers and targets in cyberspace,” Journal of Military and Strategic Studies, vol. 14, no. 2, 2012.
[56] M. Archer, “Crossing the rubicon: Understanding cyber terrorism in the european context,” The European Legacy, no. ahead-of-print, pp. 1–16, 2014.
[57] K. Al-Rawi, “Cyber warriors in the middle east: The case of the Syrian electronic army,” Public Relations Review, 2014.
[58] D. Ball, “Chinas cyber warfare capabilities,” Security Challenges, vol. 7, no. 2, pp. 81–103, 2011.

Internet of Things, Cyber-attack, Security threats.