A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive)...

Full description

Bibliographic Details
Main Authors: Muhammad Shoaib Akhtar, Tao Feng
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2022-08-01
Series:EAI Endorsed Transactions on Security and Safety
Subjects:
Online Access:https://publications.eai.eu/index.php/sesa/article/view/590
_version_ 1811197651127894016
author Muhammad Shoaib Akhtar
Tao Feng
author_facet Muhammad Shoaib Akhtar
Tao Feng
author_sort Muhammad Shoaib Akhtar
collection DOAJ
description In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive). The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT. This paper provides an outline of IoT security attacks on Three-Layer Architecture: Three-layer such as application layer, network layer, perception layer/physical layer and attacks that are associated with these layers will be discussed. Moreover, this paper will provide some possible solution mechanisms for such attacks. The aim is to produce a radical survey associated with the privacy and security challenges of the IoT. This paper addresses these challenges from the attitude of technologies and design used. The objective of this paper is to rendering possible solution for various attacks on different layers of IoT architecture. It also presents comparison based on reviewing multiple solutions and defines the best one solution for a specific attack on particular layer.
first_indexed 2024-04-12T01:17:15Z
format Article
id doaj.art-11539d3123f048f3ad12926c5d7ea386
institution Directory Open Access Journal
issn 2032-9393
language English
last_indexed 2024-04-12T01:17:15Z
publishDate 2022-08-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Security and Safety
spelling doaj.art-11539d3123f048f3ad12926c5d7ea3862022-12-22T03:53:54ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932022-08-0183010.4108/eetss.v8i30.590A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT LayersMuhammad Shoaib Akhtar0Tao Feng1Lanzhou University of Technology Lanzhou University of Technology In this contemporary era internet of things are used in every realm of life. Recent software’s (e.g., vehicle networking, smart grid, and wearable) are established in result of its use: furthermore, as development, consolidation, and revolution of varied ancient areas (e.g., medical and automotive). The number of devices connected in conjunction with the ad-hoc nature of the system any exacerbates the case. Therefore, security and privacy has emerged as a big challenge for the IoT. This paper provides an outline of IoT security attacks on Three-Layer Architecture: Three-layer such as application layer, network layer, perception layer/physical layer and attacks that are associated with these layers will be discussed. Moreover, this paper will provide some possible solution mechanisms for such attacks. The aim is to produce a radical survey associated with the privacy and security challenges of the IoT. This paper addresses these challenges from the attitude of technologies and design used. The objective of this paper is to rendering possible solution for various attacks on different layers of IoT architecture. It also presents comparison based on reviewing multiple solutions and defines the best one solution for a specific attack on particular layer. https://publications.eai.eu/index.php/sesa/article/view/590Internet of ThingsSecurity and PrivacyIoT layersattacks with solution mechanisms
spellingShingle Muhammad Shoaib Akhtar
Tao Feng
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
EAI Endorsed Transactions on Security and Safety
Internet of Things
Security and Privacy
IoT layers
attacks with solution mechanisms
title A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
title_full A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
title_fullStr A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
title_full_unstemmed A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
title_short A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers
title_sort systemic security and privacy review attacks and prevention mechanisms over iot layers
topic Internet of Things
Security and Privacy
IoT layers
attacks with solution mechanisms
url https://publications.eai.eu/index.php/sesa/article/view/590
work_keys_str_mv AT muhammadshoaibakhtar asystemicsecurityandprivacyreviewattacksandpreventionmechanismsoveriotlayers
AT taofeng asystemicsecurityandprivacyreviewattacksandpreventionmechanismsoveriotlayers
AT muhammadshoaibakhtar systemicsecurityandprivacyreviewattacksandpreventionmechanismsoveriotlayers
AT taofeng systemicsecurityandprivacyreviewattacksandpreventionmechanismsoveriotlayers