SlideShare a Scribd company logo
A Comprehensive Study of Security
of Internet-of-Things
POOJA YADAV
(2014KUCP1029)
TABLE OF CONTENTS
● INTRODUCTION
● OBJECTIVE
● IOT REFERENCE MODELS
● SCOPE OF APPLICATIONS
● POTENTIAL ATTACKERS AND THEIR MOTIVATIONS
● DEFINITION OF SECURITY IN THE SCOPE OF IOT
● VULNERABILITIES OF IOT
● SOLUTIONS FOR SECURITY ISSUES
● CONCLUSION
INTRODUCTION
We first briefly describe three widely-known IoT reference models and define security in the context of IoT.
Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new
paradigm.
Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks.
Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.
OBJECTIVE
The main objective of the paper is to give the reader the opportunity to explore which attacks have been launched, how
they have been addressed, and which threats still lurk.
IoT REFERENCE MODELS
The three-level model is an extended version of wireless sensor networks (WSNs).IoT as a combination of WSNs and
cloud servers, which offer different services to the user.[1]
The five-level model is an alternative that has been proposed to facilitate interactions among different sections of an
enterprise by decomposing complex systems into simplified applications consisting of an ecosystem of simpler and well-
defined components [1].
Figure 1. Three-level model[3] Figure 2. Five-level model[3]
Figure 3. CISCO Sevel-Level Model[1]
SCOPE OF APPLICATIONS
● Smart vehicles
● Smart buildings
● Health monitoring
● Energy management
● Environmental monitoring
● Construction management
● Food supply chain
POTENTIAL ATTACKERS AND THEIR MOTIVATIONS
Potential attackers might be interested in stealing sensitive information, e.g., credit card numbers, location data, financial
accounts’ passwords, and health-related information, by hacking IoT devices.
Moreover, they might try to compromise IoT components, e.g., edge nodes, to launch attacks against a third-party entity.
DEFINITION OF SECURITY IN THE SCOPE OF IOT
Security requirements are broken down into three main categories:
● confidentiality,
● integrity,
● availability
They provide a comprehensive list of security requirements by analyzing and examining a variety of information,
assurance, and security.
VULNERABILITIES OF IOT
Analysis of possible attacks and vulnerabilities at each level of the edge-side layer.
1. Edge Nodes Level
2. Communication Level
3. Edge Computing Level
Figure 3 . Summary of attacks and countermeasures [1].
● Confidentiality - C
● Integrity - I
● Availability -A
● Accountability -AC
● Auditability - AU
● Trustworthiness -TW
● Non-repudiation - NR
● Privacy -P
Abbreviations
EMERGING SECURITY CHALLENGES
● Exponential increase in the number of weak links
● Unexpected use of data
CONCLUSION
The emergence of the IoT paradigm in the last decade has led (and will continue to lead) to several threats and possible
attacks against security or privacy of things or individuals.
This survey attempted to summarize several IoT security attacks or concerns and countermeasures against them in a
level-by-level fashion.
BIBLIOGRAPHY
1. ARSALAN MOSENIA , (Student Member, IEEE) AND NIRAJ K. JHA, (Fellow, IEEE),”A Comprehensive Study
of Security of Internet-of-Things”,pp 1-17,2016.
2. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp.
2787–2805, 2010.
3. “R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The Internet of Things architecture, possible
applications and key challenges,” in Proc. IEEE 10th Int. Conf. Frontiers Inf. Technol., 2012, pp. 257–260.
Thank You

More Related Content

PDF
Chapter 1 2
PDF
Network security
PPTX
Secure coding
PPTX
Network Security Terminologies
PPTX
Computer Networking
PDF
Security in MANET based on PKI using fuzzy function
DOCX
MeckBenResume
PPTX
A Survey On Wireless security
Chapter 1 2
Network security
Secure coding
Network Security Terminologies
Computer Networking
Security in MANET based on PKI using fuzzy function
MeckBenResume
A Survey On Wireless security

What's hot (20)

PDF
Munjal_Patel_NYU_resume
PPTX
Showcase poster
PDF
Security challengesasa factor affectingthe
PPTX
Network Security Issues
PPTX
543 poster
PPTX
Introduction to Cryptography
PDF
A05510105
DOCX
International Journal of Mobile ad hoc and sensor networks(IJMSN)
PDF
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
PPTX
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
PPT
Injectionofattacksinmanets
PDF
Network Security Fundamentals
PPTX
Modern Network Security Issue and Challenge
PPTX
OSI Security Architecture
PPTX
Network Security: Attacks, Tools and Techniques
PPTX
Introduction to Network Security
PDF
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
PDF
phishing
PPTX
JDMDE Specialisation KaHo Sint-Lieven
Munjal_Patel_NYU_resume
Showcase poster
Security challengesasa factor affectingthe
Network Security Issues
543 poster
Introduction to Cryptography
A05510105
International Journal of Mobile ad hoc and sensor networks(IJMSN)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
Injectionofattacksinmanets
Network Security Fundamentals
Modern Network Security Issue and Challenge
OSI Security Architecture
Network Security: Attacks, Tools and Techniques
Introduction to Network Security
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
phishing
JDMDE Specialisation KaHo Sint-Lieven
Ad

Similar to Comprehensive Study Of security of IoT (20)

PDF
A Review of Information Security Issues and Techniques.pdf
PDF
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
PDF
Comprehensive survey on security problems and key technologies of the interne...
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
A Review On Intrusion Detection Systems To Secure IoT Networks
PDF
Security and Privacy Issues in IoT Environment
PDF
Internet of Things Malware : A Survey
PDF
Io t security_review_blockchain_solutions
PPTX
Emerging threats in cyber security: anticipating and mitigating future risks....
DOCX
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
PDF
Addressing IoT Security Challenges through AI Solutions
PPTX
Security aspect of IOT.pptx
PDF
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
PDF
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
PDF
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
PDF
76 s201918
DOCX
IJISRT22MAR7471.docx
PDF
Internet of Things IoT Security Perspective
PDF
A survey on secure communication protocols for io t systems
PDF
A review of security attacks and intrusion detection schemes in wireless sens...
A Review of Information Security Issues and Techniques.pdf
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive survey on security problems and key technologies of the interne...
Malware threat analysis techniques and approaches for IoT applications: a review
A Review On Intrusion Detection Systems To Secure IoT Networks
Security and Privacy Issues in IoT Environment
Internet of Things Malware : A Survey
Io t security_review_blockchain_solutions
Emerging threats in cyber security: anticipating and mitigating future risks....
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Addressing IoT Security Challenges through AI Solutions
Security aspect of IOT.pptx
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
76 s201918
IJISRT22MAR7471.docx
Internet of Things IoT Security Perspective
A survey on secure communication protocols for io t systems
A review of security attacks and intrusion detection schemes in wireless sens...
Ad

Recently uploaded (20)

PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
System and Network Administraation Chapter 3
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Transform Your Business with a Software ERP System
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
L1 - Introduction to python Backend.pptx
PPTX
ai tools demonstartion for schools and inter college
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Digital Strategies for Manufacturing Companies
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
history of c programming in notes for students .pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Design an Analysis of Algorithms I-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
System and Network Administraation Chapter 3
PTS Company Brochure 2025 (1).pdf.......
Transform Your Business with a Software ERP System
Odoo Companies in India – Driving Business Transformation.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
CHAPTER 2 - PM Management and IT Context
L1 - Introduction to python Backend.pptx
ai tools demonstartion for schools and inter college
Reimagine Home Health with the Power of Agentic AI​
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Understanding Forklifts - TECH EHS Solution
Digital Strategies for Manufacturing Companies
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
history of c programming in notes for students .pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design

Comprehensive Study Of security of IoT

  • 1. A Comprehensive Study of Security of Internet-of-Things POOJA YADAV (2014KUCP1029)
  • 2. TABLE OF CONTENTS ● INTRODUCTION ● OBJECTIVE ● IOT REFERENCE MODELS ● SCOPE OF APPLICATIONS ● POTENTIAL ATTACKERS AND THEIR MOTIVATIONS ● DEFINITION OF SECURITY IN THE SCOPE OF IOT ● VULNERABILITIES OF IOT ● SOLUTIONS FOR SECURITY ISSUES ● CONCLUSION
  • 3. INTRODUCTION We first briefly describe three widely-known IoT reference models and define security in the context of IoT. Second, we discuss the possible applications of IoT and potential motivations of the attackers who target this new paradigm. Third, we discuss different attacks and threats. Fourth, we describe possible countermeasures against these attacks. Finally, we introduce two emerging security challenges not yet explained in detail in previous literature.
  • 4. OBJECTIVE The main objective of the paper is to give the reader the opportunity to explore which attacks have been launched, how they have been addressed, and which threats still lurk.
  • 5. IoT REFERENCE MODELS The three-level model is an extended version of wireless sensor networks (WSNs).IoT as a combination of WSNs and cloud servers, which offer different services to the user.[1] The five-level model is an alternative that has been proposed to facilitate interactions among different sections of an enterprise by decomposing complex systems into simplified applications consisting of an ecosystem of simpler and well- defined components [1].
  • 6. Figure 1. Three-level model[3] Figure 2. Five-level model[3]
  • 7. Figure 3. CISCO Sevel-Level Model[1]
  • 8. SCOPE OF APPLICATIONS ● Smart vehicles ● Smart buildings ● Health monitoring ● Energy management ● Environmental monitoring ● Construction management ● Food supply chain
  • 9. POTENTIAL ATTACKERS AND THEIR MOTIVATIONS Potential attackers might be interested in stealing sensitive information, e.g., credit card numbers, location data, financial accounts’ passwords, and health-related information, by hacking IoT devices. Moreover, they might try to compromise IoT components, e.g., edge nodes, to launch attacks against a third-party entity.
  • 10. DEFINITION OF SECURITY IN THE SCOPE OF IOT Security requirements are broken down into three main categories: ● confidentiality, ● integrity, ● availability They provide a comprehensive list of security requirements by analyzing and examining a variety of information, assurance, and security.
  • 11. VULNERABILITIES OF IOT Analysis of possible attacks and vulnerabilities at each level of the edge-side layer. 1. Edge Nodes Level 2. Communication Level 3. Edge Computing Level
  • 12. Figure 3 . Summary of attacks and countermeasures [1].
  • 13. ● Confidentiality - C ● Integrity - I ● Availability -A ● Accountability -AC ● Auditability - AU ● Trustworthiness -TW ● Non-repudiation - NR ● Privacy -P Abbreviations
  • 14. EMERGING SECURITY CHALLENGES ● Exponential increase in the number of weak links ● Unexpected use of data
  • 15. CONCLUSION The emergence of the IoT paradigm in the last decade has led (and will continue to lead) to several threats and possible attacks against security or privacy of things or individuals. This survey attempted to summarize several IoT security attacks or concerns and countermeasures against them in a level-by-level fashion.
  • 16. BIBLIOGRAPHY 1. ARSALAN MOSENIA , (Student Member, IEEE) AND NIRAJ K. JHA, (Fellow, IEEE),”A Comprehensive Study of Security of Internet-of-Things”,pp 1-17,2016. 2. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010. 3. “R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The Internet of Things architecture, possible applications and key challenges,” in Proc. IEEE 10th Int. Conf. Frontiers Inf. Technol., 2012, pp. 257–260.