Responding to and Preventing Threats to Cybersecurity When Utilizing the Internet of Things

Jaipratap Singh Grewal

Abstract


The Internet of Things has the potential to connect billions of devices and is developing at a tremendous rate. Billions of people will be able to connect through it. However, this system increases the vulnerability of each device, as a breach in the security of a single connected device will compromise the rest of the system’s safety. A hacker or virus may be able to get access to multiple connected devices by targeting just one of the many devices online. Therefore, such attacks will have a much larger reach compared to the attacks on individual systems. Preventing or being able to react to this issue is important, as the safety and privacy of people must be protected. Society needs a proper protocol that can protect these connected devices from cyber-attacks. This paper aims to propose solutions that will either prevent or respond to these cyberattacks, thus making systems more secure.


Keywords


Device Security; Sensors and Devices for IoT; Security and Privacy; Social impacts; Device-to-Device Communication; Machine-to-Machine Communications; Cyber-Physical Systems.

Full Text:

PDF

References


Karen Rose, Scott Eldridge, and Lyman Chapin. “The Internet of Things: An Overview.” Internet: https://www.internetsociety.org/wpcontent/uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf, Oct. 2015.

Huawei Technologies Co., Ltd. “Harnessing the Power of Connectivity.” Internet: https://www.huawei.com/minisite/gci/files/gci_2017_whitepaper_en.pdf, 2017.

Chuck Leddy. “IOT SECURITY: HUGE PROBLEMS AND POTENTIAL SOLUTIONS”. Internet: https://www.cintas.com/ready/healthy-safety/iot-security-huge-problems-and-potential-solutions/, Jun. 26, 2016.

J. H. Ziegeldorf, O. Garcia Morchon, and K. Wehrle. (2013, June). “Privacy in the Internet of Things: threats and challenges.” Security and Communication Networks. [Online]. Available: https://doi.org/10.1002/sec.795

Irfan Saif, Sean Peasley, Arun Perinkolam. “Safeguarding the Internet of Things: Being secure, vigilant, and resilient in the connected age”. 27 July 2015. Internet: https://www2.deloitte.com/insights/us/en/deloitte-review/issue-17/internet-of-things-data-security-and-privacy.html, Jul. 27, 2015.

Deloitte Touche Tohmatsu Limited (US). “Data security and the Internet of Things”. Internet: https://www.youtube.com/watch?v=HBCFUEGgQo8, Aug. 4, 2015

Brian Krebs. “Krebs on Security”. Internet: https://krebsonsecurity.com, Jul. 18, 2018.

Paul Szoldra. “Akamai Kicked Journalist Brian Krebs’ Site off Its Servers after He Was Hit by a ‘record’ Cyberattack.”. Internet: https://www.businessinsider.in/Akamai-kickeda- journalists-site-off-its-servers-after-he-was-hit by-a-record-cyber-attack/articleshow/54473344.cms, Sep. 22, 2016.

Paul Szoldra. “Here’s How the ’Internet of Things’ Is Being Used for Major Cyberattacks on the Enterprise.”. Internet: https://www.businessinsider.in/Hereshow-the-Internet-of-Things-is-being-used-for-major-cyberattackson-the-enterprise/articleshow/54987418.cms, Oct. 21, 2016.

I. H. Lim, S. Hong, M. S. Choi, S. J. Lee, T. W. Kim, S. W. Lee, B. N. Ha. ''Security Protocols Against Cyber Attacks in the Distribution Automation System''. IEEE Transactions on Power Delivery, 30 Oct. 2009.

Alec Scott. (2017, May) ''8 ways the Internet of things will change the way we live and work''. The Globe and Mail. [Online]. Available: https://www.theglobeandmail.com/report-on-business/rob-magazine/the-future-is-smart/article24586994/

Benson Houghland. (2014, Dec.). ''What is the Internet of Things? And why should you care?''. TEDx. [Online]. Available: http://ed.ted.com/on/roPxRePe#finally

Ernst and Young Inc. (2015, Mar.). ''Cybersecurity and the Internet of Things''. EY. [Online]. Available: https://www.ey.com/Publication/vwLUAssets/EY-cybersecurity-and-the-internet-of-things/%24FILE/EY-cybersecurity-and-the-internet-of-things.pdf

Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten. “IoT Goes Nuclear: Creating a ZigBee Chain Reaction”. [Online]. Available: http://iotworm.eyalro.net

Chris Folk, Dan C., Wesley K. Kaplow, James F.X. Payne. “The Security Implications of the Internet of Things.” Internet: https://www.afcea.org/committees/cyber/documents/InternetofThingsFINAL.pdf, Feb. 2015.

Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein. ''Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials'' in Proc. CCS'17, 2017.

Teemu Väisänen, Lorena Trinberg, and Nikolaos Pissanidis. (2016). ''I accidentally malware - whatshould I do... is this dangerous?: Overcoming inevitable risks of electronic communication''. NATO Cooperative Cyber Defence Centre of Excellence. [Online]. Available: https://ccdcoe.org/sites/default/files/multimedia/pdf/I%20acc-identally%20malware.pdf

Aaron M. Kessler. (205, Jul.). ''Fiat Chrysler Issues Recall Over Hacking''. The New York Times. [Online]. Available: https://www.nytimes.com/2015/07/25/business/fiat-chrysler-recalls-1-4-million-vehicles-to-fix-hacking-issue.html

Bernie Woodall, Joseph Menn. (2015, Jul.) ''Fiat Chrysler U.S. to recall vehicles to prevent hacking''. Reuter. [Online]. Available: https://www.reuters.com/article/us-fiat-chrysler-recall/fiat-chrysler-u-s-to-recall-vehicles-to-prevent-hacking-idUSKCN0PY1U920150724

Tristan O’ Gorman. “A Primer on IoT Security Risks.” Internet: https://securityintelligence.com/a-primer-on-iot-security-risks/, Feb. 8, 2017.

euronews Knowledge. “Internet if Things: Cyber crime on the rise”. Internet: https://www.youtube.com/watch?v=z67DCxIE_6U, Feb. 3, 2016.

Paul Szoldra. “Inside the 72-hour hacking contest to take over your ’smart’ home.”. Internet: https://www.businessinsider.in/Insidethe-72-hour-hacking-contest-to-take-over-your-smarthome/articleshow/54158477.cms, Sep. 8, 2016.

John Markoff. (2016, Nov.). ''Why Light Bulbs May Be the Next Hacker Target''. The New York Times. [Online]. Available: https://www.nytimes.com/2016/11/03/technology/why-light-bulbs-may-be-the-next-hacker-target.html?_r=0

Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten. “IoT Goes Nuclear: Creating a ZigBee Chain Reaction”. [Online]. Available: http://iotworm.eyalro.net

Alan Grau. “How to Build a Safer Internet of Things.”, IEEE Spectrum: Technology, Engineering, and Science News. Internet: https://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things, Feb. 25, 2015.

Margaret Rouse, “What Is digital signature?”. Internet: https://searchsecurity.techtarget.com/definition/digital-signature

Garrett Gross. “Botnet Detection and Removal: Methods and Best Practices”. Internet: https://www.alienvault.com/blogs/security-essentials/botnet-detection-and-removal-methods-best-practices, Nov. 3, 2015.

Steve Zurier. “5 Tips For Preventing IoT Hacks”. Internet: http://www.darkreading.com/endpoint/5-tips-for-preventing-iot-hacks-------/d/d-id/1327270, Oct. 24, 2016.

Sam Thielman. “Can we secure the internet of things in time to prevent another cyber-attack?”. Internet: https://www.theguardian.com/technology/2016/oct/25/ddos-cyber-attack-dyn-internet-of-things, Oct. 25, 2016.

Microsoft Corporation. “How VPN Works”. Internet: https://technet.microsoft.com/pt-pt/library/cc779919(v=ws.10).aspx

Larry Greenemeier. “Seeking Address: Why Cyber Attacks Are So Difficult to Trace Back to Hackers”. Internet: https://www.scientificamerican.com/article/tracking-cyber-hackers/, Jun. 11, 2011.

Business Insider. “IoT Cyber Security Hacking Problems”. Internet: https://www.businessinsider.in/iot-cyber-security-hacking-problems-internet-of-things-2016-3?r=US&IR=T, Mar. 3, 2016.

Ajit Jha and Sunil M. C. “Security Considerations for the Internet of Things”. Internet: http://www.larsentoubro.com/media/30090/whitepaper_security-considerations-for-internet-of-things.pdf, 2014.

Margaret Rouse. “What Is Access Control List (ACL)?”. Internet: https://searchsoftwarequality.techtarget.com/definition/access-control-list

Andy Greenberg and Kim Zetter. “HOW THE INTERNET OF THINGS GOT HACKED”. Internet: https://www.wired.com/2015/12/2015-the-year-the-internet-of-things-got-hacked/, Dec. 28, 2015.

Margaret Rouse. “What Is Encryption?”. Internet: https://searchsecurity.techtarget.com/definition/encryption

Margaret Rouse. “What Is Log Management?”. Internet: https://searchitoperations.techtarget.com/definition/log-management

Herb Segars. “Help! My Hard Drive Is Full!”. Internet: http://www.gotosnapshot.com/myblog/help-my-hard-drive-is-full, Feb. 20, 2011.

MacPaw Inc. “Slow Mac: Why Is My Mac Running Slow”. Internet: https://macpaw.com/how-to/fix-mac-running-slow, Jun. 8, 2017.

Cisco Systems, Inc. “The Internet of Things: Reduce Security Risks with Automated Policies”. Internet: https://www.cisco.com/c/dam/en us/solutions/trends/iot/docs/security-risks.pdf, 2015.

Cisco Systems, Inc. “Internet of Things”. Internet: https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).