Skip to main content

The Internet of Things and Its Applications in Cyber Security

  • Chapter
  • First Online:
A Handbook of Internet of Things in Biomedical and Cyber Physical System

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 165))

Abstract

The Internet of Things (IoT) offers new and stimulating potential results in various pieces of the overall population, and in the zone of business, various associations and adventures could benefit by accepting the IoT and facilitate it into customary undertakings or things and organizations. These days, generally all contraptions are interconnected to each other by methods for frameworks. There are diverse contraptions are in homes, working environments, vehicles and creation plants and they run distinctive errands to help with step by step endeavors. The amount of related devices is extending all the time since manufactures present every day new web related contraptions for helping the customers of these devices in their customary day by day presence and making new propelled experiences. Internets of Things (IoT) devices are rapidly getting the opportunity to be general while IoT organizations are getting the opportunity to be inevitable. Their success has not gone unnoticed and the amount of threats and ambushes against IoT contraptions and organizations are on the extension too. Advanced ambushes are not new to IoT, but instead as IoT will be significantly weaved in our lives and social requests, it is getting the opportunity to be imperative to wander up and consider computerized obstruction essential. The objective of the area is to focus on computerized security perspective on the earth and contraptions of the Internet of Things. The amount of IoT contraptions is growing continually and these devices are used fundamentally in each part of standard every day presence. As such, mooring the IoT contraptions is expanding progressively more hugeness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20–26 (2014)

    Google Scholar 

  2. Stango, A., Prasad, N.R., Kyriazanos, D.M.: A threat analysis methodology for security evaluation and enhancement planning. In: SECURWARE’09. Third International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE, pp. 262–267 (2009)

    Google Scholar 

  3. Jiang, D., ShiWei, C.: A study of information security for M2M of IoT. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 3. IEEE, 2010, pp. V3–576

    Google Scholar 

  4. Duncan, J., Creese, S., Goldsmith, M.: Insider attacks in cloud computing. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 857–862 (2012)

    Google Scholar 

  5. Li, F., Lai, A., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 2011 6th International Conference on Malicious and Unwanted Software (MALWARE), IEEE, pp. 102–109 (2011)

    Google Scholar 

  6. Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, Hoboken (2011)

    Google Scholar 

  7. Rainer, R.K., Cegielski, C.G.: Introduction to Information Systems: Enabling and Transforming Business. Wiley, Hoboken (2010)

    Google Scholar 

  8. Baybutt, P.: Assessing risks from threats to process plants: Threat and vulnerability analysis. Process Saf. Prog. 21(4), 269–275 (2002)

    Article  Google Scholar 

  9. De Vivo, M., Carrasco, E., Isern, G., de Vivo, G.O.: A review of port scanning techniques. ACM SIGCOMM Comput. Commun. Rev. 29(2), 41–48 (1999)

    Article  Google Scholar 

  10. Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)

    Article  Google Scholar 

  11. Kizza, J.M.: Guide to Computer Network Security. Springer, Berlin (2013)

    Book  Google Scholar 

  12. Taneja, M.: An analytics framework to detect compromised IoT devices using mobility behavior. In: 2013 International Conference on ICT Convergence (ICTC). IEEE, pp. 38–43 (2013)

    Google Scholar 

  13. Prasad, N.R.: Threat model framework and methodology for personal networks (PNs). In: 2nd International Conference on Communication Systems Software and Middleware, 2007. COMSWARE 2007. IEEE, pp. 1–6 (2007)

    Google Scholar 

  14. De, S., Barnaghi, P., Bauer, M., Meissner, S.: Service modelling for the internet of things. In: 2011 Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE, pp. 949–955 (2011)

    Google Scholar 

  15. Xiao, G., Guo, J., Xu, L., Gong, Z.: User interoperability with heterogeneous IoT devices through transformation (2014)

    Google Scholar 

  16. Ansari, S., Rajeev, S., Chandrashekar, H.: Packet sniffing: a brief introduction. Potentials, IEEE 21(5), 17–19 (2002)

    Article  Google Scholar 

  17. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  18. Hongsong, C., Zhongchuan, F., Dongyan, Z.: Security and trust research in M2M system. In: 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES). IEEE, pp. 286–290 (2011)

    Google Scholar 

  19. Koien, G.M., Oleshchuk, V.A.: Aspects of Personal Privacy in Communications-Problems. River Publishers, Technology and Solutions (2013)

    Google Scholar 

  20. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  21. Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s intranet of things to a future internet of things: a wireless-and mobility-related view. Wirel. Commun. IEEE 17(6), 44–51 (2010)

    Article  Google Scholar 

  22. Cheng, Y., Naslund, M., Selander, G., Fogelstrom, E.: Privacy in machine-to-machine communications a state-of-the-art survey. In: 2012 IEEE International Conference on Communication Systems (ICCS). IEEE, pp. 75–79 (2012)

    Google Scholar 

  23. Rudner, M.: Cyber-threats to critical national infrastructure: an intelligence challenge. Int. J. Intell. Counter Intell. 26(3), 453–481 (2013)

    Article  Google Scholar 

  24. Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. Veh. Technol. Mag. IEEE 4(3), 69–75 (2009)

    Article  Google Scholar 

  25. Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: Foundations of Security Analysis and Design V. Springer, Berlin, pp. 289–338 (2009)

    Chapter  Google Scholar 

  26. Kozik, R., Choras, M.: Current cyber security threats and challenges in critical infrastructures protection. In: 2013 Second International Conference on Informatics and Applications (ICIA). IEEE, pp. 93–97 (2013)

    Google Scholar 

  27. Mahalle, P.N., Prasad, N.R., Prasad, R.: Object classification based context management for identity management in internet of things. Int. J. Comput. Appl. 63(12), 1–6 (2013)

    Google Scholar 

  28. Gluhak, A., Krco, S., Nati, M., Pfisterer, D., Mitton, N., Razafindralambo, T.: A survey on facilities for experimental internet of things research. Commun. Mag. IEEE 49(11), 58–67 (2011)

    Article  Google Scholar 

  29. Benazzouz, Y., Munilla, C., Gunalp, O., Gallissot, M., Gurgen, L.: Sharing user IoT devices in the cloud. In: 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, pp. 373–374 (2014)

    Google Scholar 

  30. Køien, G.M.: Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wirel. Pers. Commun. 61(3), 495–510 (2011)

    Article  Google Scholar 

  31. Watts, D.: Security and vulnerability in electric power systems. In: 35th North American Power Symposium, vol. 2, pp. 559–566 (2003)

    Google Scholar 

  32. Bertino, E., Martino, L.D., Paci, F., Squicciarini, A.C.: Web services threats, vulnerabilities, and countermeasures. In: Security for Web Services and Service-Oriented Architectures. Springer, Berlin, pp. 25–44 (2010)

    Chapter  Google Scholar 

  33. Padmavathi, D.G., Shanmugapriya, M. et al.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)

  34. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  35. Thoma, M., Meyer, S., Sperner, K., Meissner, S., Braun, T.: On IoT services: survey, classification and enterprise integration. In: 2012 IEEE International Conference on Green Computing and Communications (GreenCom). IEEE, pp. 257–260 (2012)

    Google Scholar 

  36. Abomhara, M., Koien, G.: Security and privacy in the internet of things: current status and open issues. In: PRISMS 2014 The 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014

    Google Scholar 

  37. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M., Doody, P.: Internet of things strategic research roadmap. Internet Things Global Technol. Soc. Trends 1, 9–52 (2011)

    Google Scholar 

  38. Dahbur, K., Mohammad, B., Tarakji, A.B.: A survey of risks, threats and vulnerabilities in cloud computing. In: Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. ACM, p. 12 (2011)

    Google Scholar 

  39. Brauch, H.G.: Concepts of security threats, challenges, vulnerabilities and risks. In: Coping with Global Environmental Change, Disasters and Security. Springer, Berlin, pp. 61–106 (2011)

    Google Scholar 

  40. Pipkin, D.L.: Information security. Prentice Hall PTR (2000)

    Google Scholar 

  41. Andreev, S., Koucheryavy, Y.: Internet of things, smart spaces, and next generation networking. Springer, LNCS 7469, 464 (2012)

    Google Scholar 

  42. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rohit Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sharma, R., Mahapatra, R.P., Sharma, N. (2020). The Internet of Things and Its Applications in Cyber Security. In: Balas, V., Solanki, V., Kumar, R., Ahad, M. (eds) A Handbook of Internet of Things in Biomedical and Cyber Physical System. Intelligent Systems Reference Library, vol 165. Springer, Cham. https://doi.org/10.1007/978-3-030-23983-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23983-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23982-4

  • Online ISBN: 978-3-030-23983-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics