Internet of Things (IoT): Security, Threats and Countermeasures

Main Article Content

Zulkarnaim Masyhur
Firmansyah Ibrahim
Didit Hermawan

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.

Article Details

Section
Art Jun

References

M. E. M.Dwisnanto Putro, ST., “Perancangan Shading Device pada Smart home,” E-Journal Tek. Elektro Dan Komput., vol. 3, no. 5, pp. 49–54, 2014.

A. Setyo and P. T. Prasetyaningrum, “Perancangan Aplikasi Internet of Thing ( IoT ) Autonomous Pada Mobil Designing Car Autonomous Internet of Thing ( IoT ) Application,” no. 84, pp. 35–38, 2018.

A. Balafoutis et al., “Precision agriculture technologies positively contributing to ghg emissions mitigation, farm productivity and economics,” Sustain., vol. 9, no. 8, pp. 1–28, 2017, doi: 10.3390/su9081339.

T. Aisyah, Y. R. Roshadi, and A. Setiawan, “Prototipe Kelas Pintar ( Smart Class ) dengan Memanfaatkan Teknologi IoT The Protoype of Smart Class using IoT Technology,” no. November 2020, pp. 83–92.

A. Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Trans. Emerg. Top. Comput., vol. 5, no. 4, 2017, doi: 10.1109/TETC.2016.2606384.

A. N. Nowroz, K. Hu, F. Koushanfar, and S. Reda, “Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps,” IEEE Trans. Comput. Des. Integr. Circuits Syst., vol. 33, no. 12, 2014, doi: 10.1109/TCAD.2014.2354293.

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey,” Secur. Distrib. Grid, Mobile, Pervasive Comput., pp. 367–409, 2007, doi: 10.1201/9780849379253-20.

E. R. Naru, H. Saini, and M. Sharma, “A recent review on lightweight cryptography in IoT,” 2017, doi: 10.1109/I-SMAC.2017.8058307.

R. Kumar and S. Rajalakshmi, “Mobile sensor cloud computing: Controlling and securing data processing over smart environment through Mobile Sensor Cloud Computing (MSCC),” 2013, doi: 10.1109/CSA.2013.166.

S. W. Boyd and A. D. Keromytis, “SQLrand: Preventing SQL injection attacks,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 3089, 2004, doi: 10.1007/978-3-540-24852-1_21.

H. Mouratidis and P. Giorgini, “Security Attack Testing (SAT)-testing the security of information systems at design time,” Inf. Syst., vol. 32, no. 8, 2007, doi: 10.1016/j.is.2007.03.002.

B. Biggio, B. Nelson, and P. Laskov, “Poisoning attacks against support vector machines,” in Proceedings of the 29th International Conference on Machine Learning, ICML 2012, 2012, vol. 2.

B. I. P. Rubinstein et al., “Antidote: Understanding and defending against poisoning of anomaly detectors,” 2009, doi: 10.1145/1644893.1644895.