CYBER SECURITY AND INTERNET OF THINGS

Muhammad Saad, Tariq Rahim Soomro

Abstract


Internet has become a vital part of our lives. The number of Internet connected devices are increasing every day and approximate there will be 34 billion IoT devices by 2020. It is observed that security is very weak in these devices and can be easily compromised by hackers as some manufactures failed to implement basic security. Current devices use standards that are easy to implement and works for most forms of communications and storage. There is no such standard solution that will work on every device within the Internet of Things, because of the varied constraints between different devices; resulting in classifications within the Internet of Things. This study addresses security challenges in the Internet of Things (IoT); first will discuss the IoT evolution, architecture and its applications in industries. Further, classify and examine privacy threats, including survey, and pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.

Full Text:

PDF

References


Nermin Hajdarbegovic. (2014, Oct) https://www.toptal.com/i. [Online]. https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things

Kristina Flüchter Felix Wortmann, "Internet of Things," Business & Information Systems Engineering, vol. 57, no. 3, pp. 221–224, June 2015.

Jiafu Wan, Caifeng Zou, Jianqi Liu Hui Suo, "Security in the Internet of Things: A Review," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, Hangzhou, China , 2012, pp. 648 - 651.

ITU. itu.int. [Online]. http://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx

Domenico Rotondi, Roberto Minerva Abyi Biru. (2015, Dec) http://iot.ieee.org. [Online]. http://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf

Google. (2016, Dec) https://www.google.com/trends/. [Online]. https://www.google.com/trends/explore?date=2006-01-01%202016-12-18&q=%2Fm%2F0b42qh,%2Fm%2F02vnd10&hl=en-US

Ms. Fenn Mr. LeHong. (2013, Aug) http://www.gartner.com/. [Online]. http://www.gartner.com/newsroom/id/2575515

Betsy Burton. (2014, Aug) http://www.gartner.com/. [Online]. http://www.gartner.com/newsroom/id/2819918?_ga=1.51071721.1904172021.1401730474

Betsy Burton. (2015, Aug) http://www.gartner.com/. [Online]. http://www.gartner.com/newsroom/id/3114217

Amy Ann Forni. (2016, Aug) http://www.gartner.com/. [Online]. http://www.gartner.com/newsroom/id/3412017

BI Intelligence. (2016, June) http://www.businessinsider.com/. [Online]. http://www.businessinsider.com/there-will-be-34-billion-iot-devices-installed-on-earth-by-2020-2016-5

W. David Stephenson Christopher J. Rezendes. (2013, June) https://hbr.org/. [Online]. https://hbr.org/2013/06/cyber-security-in-the-internet

Hong Liu, Laurence T. Yang Huansheng Ning, "Cyberentity Security in the Internet of Things," Computer , vol. 46, no. 3, pp. 46 - 53, March 2013.

C. Warren Axelrod, "Enforcing security, safety and privacy for the Internet of Things," in Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, Farmingdale, NY, USA.

NICOLE PERLROTH VINDU GOEL. (2016, Dec) http://www.nytimes.com. [Online]. http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=

(2014, Feb) http://architectcorner.yolasite.com. [Online]. http://architectcorner.yolasite.com/products.php

Microsoft. (2016, Mar) https://azure.microsoft.com. [Online]. https://azure.microsoft.com/en-us/updates/microsoft-azure-iot-reference-architecture-available/

Intel. (2016, Feb) http://www.intel.com/. [Online]. http://www.intel.com/content/www/us/en/internet-of-things/white-papers/iot-platform-reference-architecture-paper.html

Google. (2016, Oct) https://cloud.google.com/. [Online]. https://cloud.google.com/solutions/iot-overview

Lawrence Miller, IoT Security for Dummies, Carrie A. Johnson, Ed. Chichester, West Sussex, United Kingdom: John Wiley & Sons, Ltd, 2016.

Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, Hsinchun Chen Mark Patton, "Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)," in Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint, The Hague, Netherlands , 2014, pp. 232 - 235.

Andrew Meola. (2016, Aug) http://www.businessinsider.com. [Online]. http://www.businessinsider.com/internet-of-things-devices-applications-examples-2016-8?IR=T

Gemalto. (2016) http://breachlevelindex.com. [Online]. http://breachlevelindex.com/assets/Breach-Level-Index-Report-H12016.pdf

Krebs On Security. (2016, Nov) https://krebsonsecurity.com/. [Online]. https://krebsonsecurity.com/2016/11/san-francisco-rail-system-hacker-hacked/#more-37060

Jason Murdock. (2016, Feb) http://www.ibtimes.co.uk/. [Online]. http://www.ibtimes.co.uk/los-angeles-hackers-demand-3m-ransom-hospital-unlock-vital-files-1543962

BBC News. (2016, Oct) http://www.bbc.com. [Online]. http://www.bbc.com/news/business-37551633

Andy Greenberg. (2015, Aug) https://www.wired.com. [Online]. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

Peter Mell and Tim Grance. (2009, July) www.nist.gov. [Online]. http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf

Adam Pasick. (2015, Apr) http://qz.com. [Online]. http://qz.com/393909/american-airlines-planes-are-grounded-because-their-pilots-ipads-have-crashed/

SHAWN HELTON. (2015, April) http://21stcenturywire.com. [Online]. http://21stcenturywire.com/2015/04/13/remote-control-aviation-expert-says-germanwings-9525-could-have-been-hacked-electronically/

Drew Harwell. (2015, May) https://www.washingtonpost.com/. [Online]. https://www.washingtonpost.com/business/economy/fbi-probe-of-plane-hack-sparks-worries-over-flight-safety/2015/05/18/8f75e662-fd69-11e4-805c-c3f407e5a9e9_story.html?utm_term=.66213252e33d

Brian Krebs. (2016, Apr) https://krebsonsecurity.com/. [Online]. https://krebsonsecurity.com/2016/04/a-dramatic-rise-in-atm-skimming-attacks/#more-34596

OWASP. (2014, Sep) https://www.owasp.org. [Online]. https://www.owasp.org/index.php/IoT_Security_Guidance

Ralph Eckmaier, Jörg Eschweiler, Berthold Gerber, Alessandro Guarino, Kai Rannenberg, Jon Shamah, Sławomir Górniak Charles Brookson Scott Cadzow. (2016, July) https://www.enisa.europa.eu/. [Online]. https://www.enisa.europa.eu/publications/definition-of-cybersecurity



Refbacks

  • There are currently no refbacks.


Chief Editor

Prof. Dr. Ejaz Ahmed 
Dean
College of Computer Science & Information Systems

Editor

Prof Dr. S. M. Aqil Burney

Associate Editors

Prof. Dr. Tariq Rahim Soomro
Dr. Muhammad Mansoor Aalam

Publication Coordinator
Konpal Darakshan

Editorial Advisory Board (Internal)

Dr. Syed Irfan Hyder
Dr. Mohammad Irshad Khan
Dr. Shahid Amjad
Dr. Abdul Rauf Farooqui
Dr. Syed Iftikhar Ali
Dr. Tajuddin Islamuddin
Dr. Muhammad Danish Khan
Dr. Imran Majid
Dr. Fatima Riaz
Dr. Adeel Ansari
Dr. Zeeshan Shahid
Ms. Seema Ansari

Editorial Advisory Board (International)

Prof. Dr. Mazliham Mohd Su'ud, President, Universiti Kuala Lumpur, Malaysia
Prof. Dr. Ghassan Al-Qaimari, President, Emirates College of Technology, Abu Dhabi, UAE
Prof. Dr. Patrice Boursier, Universite de La Rochelle, La Rochelle, France
Prof. Dr. Mudassir Uddin, Professor, University of Karachi, Pakistan
Dr. Nadeem Doudpota, Associate Professor, Al-Baha University, KSA
Dr. Haithem Abdelrazaq Almefleh, Associate Professor, Yarmouk University, Yarmouk, Jordan
Dr. S. Asim Ali, Assistant Professor, University of Karachi, Pakistan

Member Editorial Review Board (International – Academia)

Dr. Asadaullah Shah, Professor, International Islamic University, MalaysiaDr. Hasan Wahba, President American College of Dubai, United Arab Emirates (UAE)
Dr. Tahseen Jilani, Assistant Professor, University of Manchester, UKDr. Atif Memon, Associate Professor, The University of Maryland, USA
Dr. Syed Waliullah Shah, University Sains, MalaysiaDr. Inayatullah Shah, International Islamic University, (Kuantam), Malaysia
Dr. Salahttin Kuru, Kemeburgaz University, TurkeyDr. Soon Min, INTI International University, Malaysia
Dr. Shahrulniza Musa, Professor, Malaysian France Institute, Universiti Kuala Lumpur, Bandar Baru Bangi, MalaysiaDr. R. Praveen Sam, Professor, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, KURNOOL, India
Dr. Manzoor Ahmed Hashmani, Associate Professor, University Technology Petronas, MalaysiaDr. Alveera Mehdi, Professor, Aligarh Muslim University, Aligarh, India

Dr. Sajjad Waheed, Professor, Department of Information and Communication Technology, Mawlana Bhashani Science and Technology University, Tangail 1902, Bangladesh

Dr. Kushairy Bin Abdul Kadir, Associate Professor, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia
Dr. Mohammad Hameed Ahmed AlTaei, Assistant Professor, Applied Sciences College, Sohar, OmanDr. Eiad Yafi, Associate Professor, Malaysian Institute of Information Technology Universiti, Malaysia
Dr. Muhammad Azam Sheikh, Assistant Professor, Chalmers University, SwedenDr. Safeeullah Soomro, Postdoc Dean College of Computer Studies, AMA Int. University, Bahrian
Dr. Aymen Adil Belghith, Assistant Professor, University of Sfax, Sfax,TunisiaDr. Radwan Alsadiq Alqirmazi, Assistant Professor, University of Sfax, Sfax,Tunisia
Dr. Mohammad Arif Amin, Assistant Professor, Higher College of Technology, Abu Dhabi Men’s College, Abu Dhabi, United Arab Emirates (UAE)Dr. Ismat Aldmour, Assistant Professor, Al-Baha University, Kingdom of Saudi Arabia (KSA)
Dr. AbdulRahman Ahmed Mohammed Al-Sewari, Senior Lecturer, Universiti Malaysia Pahang, Pahang, MalaysiaDr. Mohammed A. Afifi, Director, Associate of Science in Computer Science, Al Dar University College, Dubai, United Arab Emirates (UAE)
Dr. Youssef Ahmed Masmoudi, Assistant Professor, Saudi Electronic University, Jeddah male Campus, Kingdom of Saudi Arabia (KSA)Dr. Zulfiqar Memon, Assistant Professor, Ajman University of Science & Technology, Ajman, United Arab Emirates (UAE)
Dr. Abdul Basit Samsuddin Banga, Assistant Professor, Saudi Electronic University, Jeddah male Campus, Kingdom of S. Arabia (KSA)Dr. Mohamad Ismail Sulaiman, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia
Dr. Syed Faiz Ahmed, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia

Dr. Jawad Ali Shah, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia

Dr. Sarfraz Nawaz Brohi, Lecturer, Taylor’s Unversity, Lakeside Campus, Malaysia

Dr. Fahad Sikander, Assistant Professor, Saudi Electronic University, Kingdom of Saudi Arabia (KSA)


Member Editorial Review Board (International – Non Academia)

Dr. Abdul Razaque Memon, Director Solution Marketing at Huawei Technology, AustraliaDr. Syed Abbas, Project Director, NetSys Technical Services, Business Bay, Duabi, United Arab Emirates (UAE)
Dr. Muntasser Khater, Educational Senior Consultant, CAN DU e-Business, Dubai, United Arab Emirates (UAE) 

Member Editorial Review Board (National – Academia)

Dr. Madad Ali Shah, Professor and Vice Chancellor, BBS University of Technology & Skill Development, KhairpurDr. B. S. Chaudhry, Professor, Mehran University of Engineering & Technology (MUET), Jamshoro
Dr. Mir Ghulam Hyder Talpur, Professor, University of Sindh, JamshoroDr. Imdad Ismaili, Professor, University of Sindh, Jamshoro
Dr. Syed Asif Ali, Professor, Sindh Maderessah Tul Islam University, KarachiDr. Mukhtiar Ali Unar, Professor, Mehran University of Engineering & Technology (MUET), Jamshoro
Dr. Syed Amir Iqbal, Associate Professor, NED University, KarachiDr. Syed Haider Shah, Associate Professor, Univeristy of Balochistan, Quetta
Dr. Talal Shrafat Rehmani, NUST, KarachiLt. Cdr. Dr. Asif Mansoor, NUST, Karachi
Dr. Faisal Maqbool Zahid, Associate Professor, University of Faisalabad 

Member Editorial Review Board (National – Non Academia)

Dr. Amir Khan, Ministry of Defense, Govt. of Pakistan, KarachiDr. Bahrawar Jan, Pakistan Bureau of Statistics, Islamabad