Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Dr. Shikha Gupta, Vaama Nikam, Tanay Mukadam, Prathmesh Deshmukh, Prathamesh Bhanse
DOI Link: https://doi.org/10.22214/ijraset.2022.46981
Certificate: View Certificate
The Internet of things has gained intense popularity in the past few years. It has become one of the most important technologies. However along with gaining popularity, threats related to cyber security have increased. As the name suggests, Internet of Things, it is completely based on the internet which means a hacker can find a weak link in the network and exfiltrate data to the cloud and threaten to keep, delete or make the data public. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. Cybersecurity is a set of processes, tools and frameworks to protect networks, devices, programs and data from cyber attacks.This paper highlights the different types of Cyber attacks possible on IoT and suggests few mitigations towards it.
I. INTRODUCTION
Nowadays technology changes rapidly day by day and affects our lives in many ways. Internet connectivity is easily available everywhere. Security plays a vital role when IoT devices are near to us and send their data over the network. IoT devices are also extensively used in industries. Therefore, it is important to consider the risk of cyber vulnerabilities & attacks in the IoT environment and implement recommendation steps to secure the IoT environment to some extent.
The Industrial IoT is a network of physical objects that are connected to each other, and the data generated by these objects is collected and analyzed. The smart industries use thousands of smart sensors and devices in their automation processes. The Internet of Things (IoT) connects different IoT smart objects around people to make their life easier by connecting them with the internet, which leads IoT environments vulnerable to many attacks.
The ever-growing demand for Internet of Things (IoT) devices is providing a promising opportunity not only for the development of various home automation systems but also for different industrial purposes. Earlier only computers and mobile devices were connected to the internet but now due to advancement in technology other devices like televisions, air conditioners, cars cameras and other equipment are connected to the internet.
It’s estimated that the number of active IoT devices will surpass 25.4 billion in 2030. The Industrial IoT is one of the most predominant technologies in the world today. There are many risks associated with this new technology, but cyber security is one of the most important issues to be taken care of.
II. LITERATURE SURVEY
[1]This paper focuses on the research work to secure IoT solutions from the security challenges like Device cloning attacks and Sensitive data exposure. Successful security solutions have been provided for the two types of attacks. [2]In this paper we learnt about the Cisco IoT architecture. It attempts to provide us with a list of security threats and issues on the cloud-side layer of IoT which normally consists of abstraction levels and data accumulation. [3]This paper refers to the peculiarities that have been hampering the Industrial Internet of Things for which a survey analysis has been conducted in order to safeguard the exchanged information of the distributed devices. [7]This paper focuses on the cyber risk analysis and artificial intelligence in the industrial internet of things and shows us how we must incorporate the right strategies and tools to anticipate, prevent and overcome common edge computing security risks.[9]In order to provide a guideline to researchers, this survey primarily attempts to classify the attacks based on the objects of vulnerability in IoT. It gives us a detailed description about the cyber-attacks taking place in the IoT.[11]
In this paper we learnt about thorough description of attacks against Industrial IoT systems as well as analysis of indicative solutions against these vulnerabilities.
Sr.No |
Years |
Authors |
Focus |
1. |
2017 |
Swapnil Naik, Vikas Maral |
Cyber Security - IoT |
2. |
2018 |
Zeinab Bakhshi1, Ali Balador2,3 and Jawad Mustafa2, |
Industrial IoT Security Threats and Concerns by Considering Cisco and Microsoft IoT reference Models |
3. |
2018 |
Haralambos Mouratidis,Vasiliki Diamantopoulou, |
A Security Analysis Method for Industrial Internet of Things |
4. |
2019 |
C. Vijayakumaran1 , B. Muthusenthil2, B.Manickavasagam3 |
A reliable next generation cyber security architecture for industrial internet of things environment |
5. |
2019 |
Bjorn Leander , Aida Causevic ?and Hans Hansson |
Cybersecurity Challenges in Large Industrial IoT Systems |
6. |
2020 |
USMAN TARIQ 1, AHMAD O. ASEERI , MOHAMMED SAEED ALKATHEIRI3 , AND YU ZHUANG4 |
Context-Aware Autonomous Security Assertion for Industrial IoT |
7. |
2020 |
Petar Radanliev1*, David De Roure1 , Kevin, Jason R. C. Nurse2, Rafael Mantilla Montalvo3, Omar Santos3, La’Treall Maddox3 and Pete Burnap4 |
Cyber risk at the edge |
8. |
2020 |
Sidi Boubacar ElMamy 1, Hichem Mrabet 2, Hassen Gharbi 3, Abderrazak Jemai 4 and Damien Trentesaux |
A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0 |
9. |
2020 |
Yash Shah, Shamik Sengupta |
A survey on Classification of Cyber-attacks on IoT and IIoT devices |
10. |
2021 |
Henry Vargas , Carlos Lozano-Garzon * , Germán A. Montoya * and Yezid Donoso |
Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach |
11. |
2021 |
Kostantinos Demertzis, Konstantinos Demertzis |
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures |
12. |
2021 |
Lubna Luxmi Dhirani 1,2,*, Eddie Armstrong 3 and Thomas Newe |
Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap |
III. IOT DEVICES
IoT devices can classified into different categories
A. IIOT (Industrial Internet of Things )
B. Classification of Attacks
1. Data Accumulation Layer
a. SQL Injection: In an SQL injection attack, the attacker tries to insert malicious SQL (Structured Query Language) commands for execution and hamper the contents of the database. The SQL injection attack allows the user to spoof, identify, disturb the existing data, make it unavailable or delete the data. An SQL injection attack works when the hacker impersonates someone who is allowed to execute a finite set of requests: the attacker inputs a valid request and interchanges it with the new instructions which also get executed. IOT devices are difficult to secure for various reasons. One of the biggest concerns is that these devices need to be able to be accessed remotely, which means they cannot be guarded with a firewall which indeed leaves IOT devices exposed to many types of attacks that would easily be circumvented by desktop or mobile devices.
b. Ransomware: Ransomware attacks threaten to deny access to the computer system, usually by using cryptographic encryption techniques. Ransomware is a malicious software. It uses malwares and malicious codes to encrypt the data. In numerous cases, the ransom demand comes with a deadline. If the victim doesn’t pay, the ransom is gone forever or the ransom increases. It is an IoT environment which is able to shut off the entire network of physical devices, because it is easy for such powerful malware to take the control of devices with constrained resources. Ransomware is capable of affecting all the security aspects of IoT, which include integrity, authentication, and availability.
c. Malicious Attack: A malware attack is a common cyberattack where malware executes prohibited actions on the victim’s system. The malicious software confines many specific types of attacks such as spyware, ransomware, command and control, and more. Some malware attacks end up with mainstream news coverage due to their appalling impact. An example of a famous malware attack is the Operation Prowli ransomware attack.
Best practices against malware attacks:
2. Data Abstraction Layer
a. DDOS: A Denial of Service attack is a vicious attempt to affect the vacuity of a targeted system, similar as a website or operation, to licit end druggies.[11] Generally, bushwhackers induce large volumes of packets or requests eventually overwhelming the target system. In case of a Distributed Denial of Service attack, the bushwhacker uses multiple compromised or controlled sources to induce the attack. In general, DDoS attacks can be insulated by which subcaste of the Open Systems Interconnection(OSI) model they attack.[6] They're most common at the Network(subcaste 3), Transport( Subcaste 4), donation(Subcaste 6) and operation( Subcaste 7) Layers. [9]
b. Man in The Middle Attack: A man- in- the- middle (MITM) attack is a type of cyberattack where bushwhackers block a discussion or data transfer, either by wiretapping or by pretending to be a licit party.[11] To the victim, it'll appear as though a standard exchange of information is underway but by fitting themselves into the “middle” of the discussion or data transfer, the bushwhacker can still commandeer information.[3] The thing of a MITM attack is to recoup nonpublic data similar to bank account details, credit card figures, or login credentials, which may be used to carry out further crimes like identity theft or illegal fund transfers. Because MITM attacks are carried out in real time, they frequently go undetected until it’s too late.
Prevention of Main in the Middle Attack:
c. Buffer Overflow: Buffer overflow occurs when a program or process attempts to write further data to a fixed- length block of memory, or buffer, than the buffer is allocated to hold, the redundant data overflows into conterminous memory locales and corrupts or overwrites the data in those locales.[11] The redundant data occasionally holds specific instructions for conduct intended by a hacker or vicious stoner, this data could spark a response that damages lines, changes data or unveils private information.[3] Hackers use buffer overflows to preempt system’s database information and to intrude prosecution of system programs. Best way to avoid Buffer Overflow is to write secure law.
d. Botnet: Botnet Attack happens when a group of internet- connected bias is infected by malware that's under control by a vicious hacker.[3] It generally involve transferring spam, data theft, exploiting sensitive information, or launching vicious DDoS attacks. Botnets use your bias to fiddle other people or beget dislocations each without your concurrence.[11] The bots serve as a tool to automate mass attacks similar as data theft, garçon crashing and malware distribution. This attack targets database services which substantially includes MySql waiters
Prevention of Botnet Attacks:
e. Reverse Engineering: Reverse- Engineering is the act of dismembering an object to see how it works. A Reverse Engineering attack is a person- to- person attack in which a bushwhacker convinces the target that he or she has a problem or might have a certain problem in the future and that he, the bushwhacker, is ready to help break the problem.[3] The hacker establishes contact with the target through emails and social media platforms, using multiple schemes and pretending to be a donator or professed security labor force to move them to give access to their system network. Though this fashion may feel outdated and ridiculous, it has proved largely effective, especially when the victim's system/ network shows signs of being compromised. Hackers use the information to attack an operation, and they take piecemeal programs to produce vicious performances of them.[6] Although rear engineering presents a serious threat to operations, numerous apps are reaching the request without any safeguards against the practice. In a study of 30 mobile fiscal apps, 97 suffered from a lack of double protection, making it possible to decompile the apps and review the source law.
f. Brute Force Attack: A Brute Force Attack is a trial-and- error method. It is used to decode sensitive data. The most common applications for such attacks are cracking passwords and cracking encryption keys. It uses trial and error to crack passwords, login credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorized access to individual accounts and organizations’ systems and networks.[6] Different types of brute force attacks use different methods to reveal sensitive data.
Some of the popular types of brute force attacks are as follows:
IV. IOT SPOOFING
A. Attack Mitigation
Hackers often target weak or vulnerable links that exist in networks or security systems employed to manage these devices. Attackers are actively looking to exploit these weaknesses to their benefit. Nowadays, every device that is connected to the internet is prone to cyber-attacks. The interconnection of IoT/IIoT devices benefits attackers as all they are required to do is find one vulnerability and they can access data from all of the connected devices. In this section, some of the most common methods used to protect the system against Cyberattacks are discussed.
In this study, a thorough description of attacks against Industrial IoT systems was carried out, considering the most important features and vulnerabilities that they incorporate, at the same time a thorough analysis of indicative solutions against these vulnerabilities, as proposed in the most recent literature.[6] As future scope, we aim to analyze more IoT Systems in detail and focus on the cyber security aspects identified in this paper to provide solutions for the same.The aim is to analyze solutions that can be applied to a truly modular infrastructure that scales well with respect to large scale IoT systems.[9]
[1] Swapnil Naik, Vikas Maral, ‘Cyber Security -IoT’ in 2017 [2] Zeinab Bakhshi1, Ali Balador2,3 and Jawad Mustafa2, ‘Industrial IoT Security Threats and Concerns by Considering Cisco and Microsoft IoT reference Models’ in 2018 [3] Haralambos Mouratidis,Vasiliki Diamantopoulou, ‘A Security Analysis Method for Industrial Internet of Things ’ in 2018 [4] C. Vijayakumaran, B. Muthusenthil, B.Manickavasagam3 ‘A reliable next generation cyber security architecture for industrial internet of things environment’ in 2019 [5] Bjorn Leander , Aida Causevic ?and Hans HanssonCybersecurity Challenges in Large Industrial IoT Systems in 2019. [6] USMAN TARIQ 1, AHMAD O. ASEERI , MOHAMMED SAEED ALKATHEIRI3 , AND YU ZHUANG4, ‘Context- Aware Autonomous Security Assertion for Industrial IoT’ in 2020 [7] Petar Radanliev1*, David De Roure1, Kevin Page1, Jason R. C. Nurse2, Rafael Mantilla Montalvo3, Omar Santos3, La’Treall Maddox3 and Pete Burnap4, ‘Cyber risk at the edge’ in 2020 [8] Sidi Boubacar ElMamy 1, Hichem Mrabet 2 , Hassen Gharbi 3 , Abderrazak Jemai 4 and Damien Trentesaux, ‘A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0’ in 2020 [9] Yash Shah, Shamik Sengupta, ‘A survey on Classification of Cyber-attacks on IoT and IIoT devices’ in 2020 [10] Henry Vargas , Carlos Lozano-Garzon * , Germán A. Montoya * and Yezid Donoso, ‘Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach’ [11] Konstantinos Demertzis, ‘Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures’ [12] Lubna Luxmi Dhirani 1,2,*, Eddie Armstrong 3 and Thomas Newe, ‘Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap’ [13] Ghazi Abdalla Abdalrahman, Hacer Varol ,’Defending Against Cyber-Attacks on the Internet of Things ’, 2019
Copyright © 2022 Dr. Shikha Gupta, Vaama Nikam, Tanay Mukadam, Prathmesh Deshmukh, Prathamesh Bhanse. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET46981
Publish Date : 2022-10-04
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here