A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model

Abstract

Internet of Things (IoT) has not yet reached a distinctive definition. A generic understanding of IoT is that it offers numerous services in many domains, utilizing conventional internet infrastructure by enabling different communication patterns such as human-to-object, object-to-objects, and object-to-object. Integrating IoT objects into the standard Internet, however, has unlocked several security challenges, as most internet technologies and connectivity protocols have been specifically designed for unconstrained objects. Moreover, IoT objects have their own limitations in terms of computation power, memory and bandwidth. IoT vision, therefore, has suffered from unprecedented attacks targeting not only individuals but also enterprises, some examples of these attacks are loss of privacy, organized crime, mental suffering, and the probability of jeopardizing human lives. Hence, providing a comprehensive classification of IoT attacks and their available countermeasures is an indispensable requirement. In this paper, we propose a novel four-layered IoT reference model based on building blocks strategy, in which we develop a comprehensive IoT attack model composed of four key phases. First, we have proposed IoT asset-based attack surface, which consists of four main components: 1) physical objects, 2) protocols covering whole IoT stack, 3) data, and 4) software. Second, we describe a set of IoT security goals. Third, we identify IoT attack taxonomy for each asset. Finally, we show the relationship between each attack and its violated security goals, and identify a set of countermeasures to protect each asset as well. To the best of our knowledge, this is the first paper that attempts to provide a comprehensive IoT attacks model based on a building-blocked reference model.

Authors and Affiliations

Hezam Akram Abdul-Ghani, Dimitri Konstantas, Mohammed Mahyoub

Keywords

Related Articles

Collaborative Learning Skills in Multi-touch Tables for UML Software Design

The use of Multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located collaborative design tasks. This pa...

Mobile Technology based Polio-Vaccination System (PVS) – First Step Towards Polio-Free Pakistan

Health information technology revolutionized the world with its great expansion and widespread in the domain of health care system. Most of the developed countries adopted advanced technology in their vaccination systems...

Improvement of Sample Selection: A Cascade-Based Approach for Lesion Automatic Detection

Computer-Aided Detection (CADe) system has a significant role as a preventative effort in the early detection of breast cancer. There are some phases in developing the pattern recognition on the CADe system, including th...

Gait Identification using Neural Network

Biometric System has become more important in security and verification of any human, which is under surveillance. Identification from distance is also possible by this technology. Researchers are taking interest to find...

Variable Reduction-based Prediction through Modified Genetic Algorithm

Due to the massive influence in the use of prediction models in different sectors of society, many researchers have employed hybrid algorithms to increase the accuracy level of the prediction model. The literature sugges...

Download PDF file
  • EP ID EP278321
  • DOI 10.14569/IJACSA.2018.090349
  • Views 95
  • Downloads 0

How To Cite

Hezam Akram Abdul-Ghani, Dimitri Konstantas, Mohammed Mahyoub (2018). A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. International Journal of Advanced Computer Science & Applications, 9(3), 355-373. https://europub.co.uk/articles/-A-278321