The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.
Published in | Internet of Things and Cloud Computing (Volume 12, Issue 2) |
DOI | 10.11648/j.iotcc.20241202.12 |
Page(s) | 28-39 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2024. Published by Science Publishing Group |
IoT, Security, Framework, Attacks, Network, Sensors
Components | Features | Technological Challenge | Security Challenge | Attacks Type |
---|---|---|---|---|
RFID | Unique Identification Tags | Tracking, DoS, and Repudiation | Alteration, spoofing, and deletion | Counterfeiting and Eavesdropping |
Sensors | Sensors and Actuators | Exhaustion and Sybil | Routing and Flooding | Tampering and Jamming. |
WSNs | Receivers, Radios, and Receivers | Misconfiguration and Access point failure | Unfairness, Hijacking (equipment), loss of signal and hacking | Malicious attacks |
Near Field Communication (NFC) | Extension of RFID (NFC Tag) | Complex ecosystem, DoS | Lack of Infrastructure | Eavesdropping, collision, and MitM attacks |
Components | Features | Technological Challenge | Security Challenge | Attacks Type |
---|---|---|---|---|
Bluetooth | Spectrum (Frequency hopping) | Bluesnarfing, link latency, and Bluejacking | DoS, Eavesdropping | Snarf attack, backdoor attack, and bluebugging. |
ZigBee | Radio and Microcontroller | Data Manipulation, Packet decoding | Traffic sniffing, data injection, eavesdropping, and hacking | Scapy, Killerbee and Killerbee stinger. |
LTE | User Equipment (UE) and Evolved Packet Core (EPC) | Fake LTE station, Data caching, Framing and Clickjacking | Eavesdropping, confidentiality, and authenticity | DDoS/DoS Attacks, Phishing Attacks, and MitM attacks. |
NB-IoT | Arduino footprint | The control server comprised Firmware corruption and embedded malware | Device hacking, default password hacking, and authorization | DDoS and MitM attacks. |
5G | Spectrum beyond 6GHz, Advanced MIMO and Beamforming | Deployment of heterogeneous hardware and software and Misbehaving devices | Data exposure, Data inadequacy, and Unauthorized attacks | DoS, identity attacks, and phishing attacks. |
Components | Features | Technological Challenge | Security Challenge | Attacks Type |
---|---|---|---|---|
Smart City | Street lighting, good land use, waste, and water distribution management | Organized crime, terrorist groups, commercial events, service disruption, and natural events | Cybercrime, privacy invasion, eavesdropping and website defacements | Smart city DoS and identity attacks. |
Smart Healthcare | Smart Healthcare cards | Unintentional action and Insider misuse | Hacking | Cyber-attacks, Internal attacks. |
Smart Transportation | Traffic Control and Parking | Privacy details | Security plagued | Cyber-attacks and Smart DoS. |
Smart Government | e-government, Economic development | Physical security and Information Manipulation | Eavesdropping, privacy invasion, Cybercrime, and website defacements | DoS and Malicious attacks. |
Smart Grid | Smart energy and Smart meter | Customer security and Physical security | Trust and Hacking | Malicious attacks. |
IoT | Internet of Things |
KMS | Key Management Systems |
(SOA) | Service-Oriented Architecture |
CoAP | Constrained Application Protocol |
E2E | End-to-End |
DoS | Denial of Service |
DDoS | Distributed Denial of Service |
SDN | Software-Defined Networking |
NFV | Network Function Virtualization |
DTLS | Datagram Transport Layer Security |
MitM | Man-in-the-Middle |
IDN | Intelligent Digital Network |
AES | Advanced Encryption Standard |
SSLs | Secure Sockets Layer |
[1] | W. T. Sung, I. V. Devi, S. J. Hsiao, and F. N. Fadillah, “Smart Garbage Bin Based on AIoT,” Intell. Autom. Soft Comput., vol. 32, no. 3, pp. 1387–1401, 2022, |
[2] | M. Jingyao, Z. Gang, and Z. Ling, “Governance mechanisms implementation in the evolution of digital platforms: a case study of the Internet of Things platform,” R D Manag., vol. 52, no. 3, pp. 498–516, 2022, |
[3] | K. P. Seng, L. M. Ang, and E. Ngharamike, “Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks,” Int. J. Distrib. Sens. Networks, vol. 18, no. 3, 2022, |
[4] | P. Title and T. Name, “Presentation Schedule,” pp. 1–13, 2023, |
[5] | K. Boikanyo, A. M. Zungeru, B. Sigweni, A. Yahya, and C. Lebekwe, “Remote patient monitoring systems: Applications, architecture, and challenges,” Sci. African, vol. 20, no. March, p. e01638, 2023, |
[6] | A. A. Pise et al., “Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues,” Comput. Intell. Neurosci., vol. 2022, pp. 1–14, 2022, |
[7] | A. Bano, I. Ud Din, and A. A. Al-Huqail, “AIoT-Based Smart Bin for Real-Time Monitoring and Management of Solid Waste,” Sci. Program., vol. 2020, 2020, |
[8] | A. Okubanjo, A. Okandeji, and E. Daniel, “Smart Bin and IoT: A Sustainable Future for Waste Management System in,” J. Sci., vol. 37, no. 1, 2023, |
[9] | M. Tauseef, M. R. Kounte, A. H. Nalband, and M. R. Ahmed, “Exploring the Joint Potential of Blockchain and AI for Securing Internet of Things,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 4, pp. 885–895, 2023, |
[10] | A. R. Khan, I. Abunadi, B. Alghofaily, H. Ali, and T. Saba, “Automatic Diagnosis of Rice Leaves Diseases Using Hybrid Deep Learning Model,” J. Adv. Inf. Technol., vol. 14, no. 3, pp. 418–425, 2023, |
[11] | J. P. S. Piest, Y. Masuda, and M. E. Iacob, “Digital Architectures Under Society 5.0: An Enterprise Architecture Perspective,” Lect. Notes Bus. Inf. Process., vol. 466 LNBIP, no. August, pp. 5–24, 2023, |
[12] | P. Singhal, P. Sharma, and D. Arora, “An approach towards preventing IoT based sybil attack based on contiki framework through cooja simulator,” Int. J. Eng. Technol., vol. 7, no. 2.8, p. 261, 2018, |
[13] | V. K. Patil, V. R. Pawar, S. P. Kulkarni, T. A. Mehta, and N. R. Khare, “Real Time Emotion Recognition with AD8232 ECG Sensor for Classwise Performance Evaluation of Machine Learning Methods,” Int. J. Eng. Trans. C Asp., vol. 36, no. 6, pp. 1040–1047, 2023, |
[14] | Q. Zhang et al., “Wearable Triboelectric Sensors Enabled Gait Analysis and Waist Motion Capture for IoT-Based Smart Healthcare Applications,” Adv. Sci., vol. 9, no. 4, pp. 1–13, 2022, |
[15] | D. Muhammed, E. Ahvar, S. Ahvar, and M. Trocan, “A User-friendly AIoT-Based Crop Recommendation system (UACR): concept and architecture,” Proc. - 16th Int. Conf. Signal-Image Technol. Internet-Based Syst. SITIS 2022, no. April 2023, pp. 569–576, 2022, |
[16] | Y. J. Lin, Y. C. Chen, J. Y. Zheng, D. W. Shao, D. Chu, and H. T. Yang, “Blockchain-Based Intelligent Charging Station Management System Platform,” IEEE Access, vol. 10, no. September, pp. 101936–101956, 2022, |
[17] | Z. Zhang, F. Wen, Z. Sun, X. Guo, T. He, and C. Lee, “Artificial Intelligence‐Enabled Sensing Technologies in the 5G/Internet of Things Era: From Virtual Reality/Augmented Reality to the Digital Twin,” Adv. Intell. Syst., vol. 4, no. 7, p. 2100228, 2022, |
[18] | Z. Boulouard, M. Ouaissa, M. Ouaissa, and S. El Himer, AI and IoT for Sustainable Development in Emerging Countries, vol. 105, no. January. 2022. |
[19] | A. Chauhan, M. Bahadir, and B. Teichgräber, “Sc Pt Ac,” Water Res., 2017, [Online]. Available: |
[20] | M. De Donno, N. Dragoni, A. Giaretta, and A. Spognardi, “DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation,” Secur. Commun. Networks, vol. 2018, 2018, |
[21] | M. A. R. Abdeen, I. A. Nemer, T. R. Sheltami, M. H. Ahmed, and M. Elnainay, “A Hierarchical Algorithm for In-city Parking Allocation Based on Open Street Map and AnyLogic Software,” Arab. J. Sci. Eng., 2023, |
[22] | P. Knebel, “An Artificial Intelligence of Things based Method for Early Detection of Bark Beetle Infested Trees,” Lect. Notes Informatics (LNI), Proc. - Ser. Gesellschaft fur Inform., vol. P-328, pp. 111–120, 2022. |
[23] |
K. Ning, “Data-driven artificial intelligence techniques in renewable energy system,” no. 1999, 2021, [Online]. Available:
https://dspace.mit.edu/bitstream/handle/1721.1/132891/1263357737-MIT.pdf?sequence=1&isAllowed=y |
[24] | C. Chakraborty, M. R. Khosravi, S. H. Ahmed, and J. J. P. C. Rodrigues, “Guest Editorial AIoMT-Enabled Medical Sensors for Remote Patient Monitoring and Body-Area Interfacing: Design and Implementation, Practical Use, and Real Measurements and Patient Monitoring,” IEEE J. Biomed. Heal. Informatics, vol. 26, no. 12, pp. 5769–5771, 2022, |
[25] | A. H. Hassan, R. bin Sulaiman, M. A. Abdulgabber, and H. Kahtan, “Balancing Technological Advances with User Needs: User-centered Principles for AI-Driven Smart City Healthcare Monitoring,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 3, pp. 365–376, 2023, |
[26] | Y. J. Lin, Y. C. Chen, J. Y. Zheng, D. Chu, D. W. Shao, and H. T. Yang, “Blockchain Power Trading and Energy Management Platform,” IEEE Access, vol. 10, no. June, pp. 75932–75948, 2022, |
[27] | M.-L. Tham, Y. J. Wong, B.-H. Kwan, X. H. Ng, and Y. Owada, Artificial Intelligence of Things (AIoT) for Disaster Monitoring using Wireless Mesh Network, vol. 1, no. 1. Association for Computing Machinery, 2023. |
[28] | M. Wang, F. Zhang, L. Ma, and Y. Tian, “Adaptive VR Video Data Transmission Method Using Mobile Edge Computing Based on AIoT Cloud VR,” J. Sensors, vol. 2022, 2022, |
[29] | P. Mishra and S. Shrivastava, “Cloud AIoT based Smart Wheelchair using Module for Social Distancing, Temperature Monitoring, and Oximeter Module,” … J. Inf. Technol., vol. 7, no. 5, pp. 29–35, 2021, [Online]. Available: |
[30] | N. Chumuang, K. Kocento, M. Ketcham, and A. Farooq, “Design and Prototyping of Intelligent Bin by Using AIoT,” Int. Conf. Cybern. Innov. ICCI 2022, no. February, 2022, |
[31] | L. Lei, Y. Tan, K. Zheng, S. Liu, K. Zhang, and X. Shen, “Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges,” IEEE Commun. Surv. Tutorials, vol. 22, no. 3, pp. 1722–1760, 2020, |
[32] | C. Tzagkarakis, N. Petroulakis, and S. Ioannidis, “Botnet attack detection at the IoT edge based on sparse representation,” Glob. IoT Summit, GIoTS 2019 - Proc., pp. 1–6, 2019, |
[33] | M. Y. Hiou, “AIoT-Based Quality Control Production Line,” no. December, 2022, |
[34] | A. Kumar, “AIoT Technologies and Applications for Smart Environments,” AIoT Technol. Appl. Smart Environ., no. December 2022, 2022, |
[35] | S. E. Najafi, H. Nozari, and S. A. Edalatpanah, “Artificial intelligence of things (AIoT) and industry 4.0-based supply chain (FMCG Industry),” A Roadmap Enabling Ind. 4.0 by Artif. Intell., no. December, pp. 31–42, 2022, |
[36] | Y.-J. Lin, C.-W. Chuang, C.-Y. Yen, S.-H. Huang, J.-Y. Chen, and S.-Y. Lee, “An AIoT Wearable ECG Patch with Decision Tree for Arrhythmia Analysis,” 2019 IEEE Biomed. Circuits Syst. Conf., no. October 2019, pp. 1–4, 2019, |
[37] | G. Ng et al., “Amalgamation of smart AIoT based construction site monitoring with robotics: viAct’s extended horizon,” no. November, 2021, [Online]. Available: |
[38] | N. Cam-Winget, A.-R. Sadeghi, and Y. Jin, “Invited - Can IoT be secured,” Proc. 53rd Annu. Des. Autom. Conf. - DAC ’16, pp. 1–6, 2016, |
[39] | H. M. Zahid, “A Framework for Identification and Classification of IoT Devices for Security Analysis in Heterogeneous Network,” Wirel. Commun. Mob. Comput., vol. 2022, no. Idc, 2022, |
[40] | K. Ding, “Smart steel bridge construction enabled by BIM and Internet of Things in industry 4.0: A framework,” ICNSC 2018 - 15th IEEE Int. Conf. Networking, Sens. Control, pp. 1–5, 2018, |
[41] | A. Kumar, K. S. Kumar, M. Sharma, C. Menaka, R. Naaz, and V. Vekriya, “Machine learning in molecular communication and applications for health monitoring networks,” Soft Comput., 2023, |
[42] | M. C. Chiu, W. M. Yan, S. A. Bhat, and N. F. Huang, “Development of smart aquaculture farm management system using IoT and AI-based surrogate models,” J. Agric. Food Res., vol. 9, no. August, p. 100357, 2022, |
[43] | S. Praharaj, B. B. Mishra, U. S. Mishra, R. R. Panigrahi, and P. C. Mishra, “Role of Service Automation on Guest Experience of Hotel Industry,” Tour. Hosp. Manag., vol. 29, no. 2, pp. 265–278, 2023, |
APA Style
Alaba, F. A., Madu, I. M., Musa, H. (2024). Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet of Things and Cloud Computing, 12(2), 28-39. https://doi.org/10.11648/j.iotcc.20241202.12
ACS Style
Alaba, F. A.; Madu, I. M.; Musa, H. Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet Things Cloud Comput. 2024, 12(2), 28-39. doi: 10.11648/j.iotcc.20241202.12
AMA Style
Alaba FA, Madu IM, Musa H. Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet Things Cloud Comput. 2024;12(2):28-39. doi: 10.11648/j.iotcc.20241202.12
@article{10.11648/j.iotcc.20241202.12, author = {Fadele Ayotunde Alaba and Ifeyinwa Marisa Madu and Haliru Musa}, title = {Attacks, Challenges, and Countermeasures for an Integrated IoT Framework }, journal = {Internet of Things and Cloud Computing}, volume = {12}, number = {2}, pages = {28-39}, doi = {10.11648/j.iotcc.20241202.12}, url = {https://doi.org/10.11648/j.iotcc.20241202.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20241202.12}, abstract = {The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user. }, year = {2024} }
TY - JOUR T1 - Attacks, Challenges, and Countermeasures for an Integrated IoT Framework AU - Fadele Ayotunde Alaba AU - Ifeyinwa Marisa Madu AU - Haliru Musa Y1 - 2024/08/15 PY - 2024 N1 - https://doi.org/10.11648/j.iotcc.20241202.12 DO - 10.11648/j.iotcc.20241202.12 T2 - Internet of Things and Cloud Computing JF - Internet of Things and Cloud Computing JO - Internet of Things and Cloud Computing SP - 28 EP - 39 PB - Science Publishing Group SN - 2376-7731 UR - https://doi.org/10.11648/j.iotcc.20241202.12 AB - The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user. VL - 12 IS - 2 ER -