You are on page 1of 3


Wei Zhou, Yuqing Zhang, and Peng Liu.” The Effect of IoT New Features on Security and
Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved” January, 2018

1. Mostly designers don’t notice the interdependence between IOT devices. They
usually work on single system, making It easy for attackers.
2. Providing more privilege to anyone has also become embarrassing with respect to
permission of excess.
3. There are a lot of IOT devices available today, so it is very difficult to make a defense
system that will work for all.
4. How we can gain protection with less software and hardware resources, on
lightweight devices.
5. IOT botnet virus is a great challenge. How can we prevent from it?
6. Most IOT devices don’t have virus detection or any malicious detection software.
7. There is always a tradeoff between getting benefits, and privacy of information.
8. When devices switch from one network to another and from one domain to another,
data is passed which is a threat to integrity of data.
Ashvini Kamble and Sonali Bhutad .” SURVEY ON INTERNET OF THINGS (IOT) SECURITY
ISSUES & SOLUTIONS”: Proceedings of the Second International Conference on Inventive
Systems and Control (ICISC 2018)
1. Poor authorization mechanism in RFID
2. Creating a copy of tags:
Attacker create a copy of tags, such that creator cannot recognize them.
3. Injecting the fake data on any captured node or device:
Attacker can inject the fake piece of information in regular piece of information.
4. Counter Node attack:
Counter node is added, which prevents data from being transferred over network.
5. Replay attack:
A destination node get a packet sent by attacker to gain trust of the user, which is used
for authentication later.
1. Spoofing:
Attacker get the complete right and then send the legal tag identification.
2. Packets drop:
A node is made attractive, so that data flow towards that node, resulting in packets drop.
3. Nodes inside network are provided with less life time batteries, and nodes are kept
wakeful to reduce battery life time.
4. Poor security of protocols:
IP based IOT devices are have a greater chances of revealing the address to internet
world causing problems.
1. Phishing
With the help of inflamed emails and spoofing adversary gets the authorization
credentials of user.
2. Malicious worms help attacker achieve private data, which is tempered or used for self-
3. Sniffing
Attacker send a sniffer to network causing a lot of information gain, like username and
4. Software vulnerabilities:
Programmers write code, without following any standard. There is no any memory
management used, resource management and threads management used in code written.
5. Data Protection:
Since, there non fool proof algorithms used, there can be chances of important data loss.
6. Cloud Computing issue:
DDOS attack make system shutdown and data center offline cause the network to use a
lot of bandwidth and disk space.
Mrs. Snehal Deshmukh et al. ” Security Protocols for Internet of Things: A Survey”
1. Link Layer Security:
For a secure communication between two nodes, security at each node is needed to be
implemented. One solution to secure key is that, the session key is made between server and
client. And TLS is preferable because TCP is used TLS.
2. Network Layer Security:
IOT protocol 6LoWPAN with improved security and encryption are is used in IP
architecture. It is easy to integrate the wireless sensor network with theses kinds of IP
architecture. With the help of this , IPSec can be used, to enable more secure