Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.2.20

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study  

Alanezi, Mohammed Ateeq (College of Computer Science and Engineering, University of Hafr Al Batin)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.2, 2022 , pp. 153-158 More about this Journal
Abstract
The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.
Keywords
Internet of Things; Cyber security; Artificial intelligence (AI); Information technology; Networks; Malicious attacks;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of iot: Applications, challenges, and opportunities with china perspective," IEEE Internet of Things journal, vol. 1, no. 4, pp. 349-359, 2014.   DOI
2 Lin, Shi-Wan, Brandford Miller, Jacques Durand, Graham Bleakley, Amine Chigani, Robert Martin, Brett Murphy, and Mark Crawford. 2019. The Industrial Internet of Things Volume G1: Reference Architecture V1.90. Industrial Internet Consortium, June. Accessed January 2022. https://www.iiconsortium.org/pdf/IIRA-v1.9.pdf
3 B. Ramsey, B. Mullins, Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks, in: J. Butts, S. Shenoi (Eds.), Critical Infrastructure Protection VII, Vol. 417 of IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2013, pp. 63-79
4 Gritzalis, D.; Stergiopoulos, G.; Vasilellis, E.; Anagnostopoulou, A. Readiness Exercises: Are Risk Assessment Methodologies Ready for the Cloud. In Advances in Core Computer Science-Based Technologies; Springer: Cham, Switzerland, 2021.
5 S. Shukla Reliable critical nodes detection for internet of things (iot) Wireless Networks, 27 (4) (2021), pp. 2931-2946   DOI
6 Om Kumar CU, Bhama PRKS (2019) Detecting and confronting flash attacks from IoT botnets. J Supercomput 75(12):8312-8338   DOI
7 Priyadarshini I., et al, Identifying cyber insecurities in trustworthy space and energy sector for smart grids, Comput. Electr. Eng., 93 (2021), Article 107204
8 Desnitsky, V.; Kotenko, I. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. In Econometrics for Financial Applications; Springer Science and Business Media LLC: Berlin, Germany, 2017; Volume 737, pp. 263-270.
9 Noshina Tariq, Farrukh Aslam Khan, Muhammad Asim, Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis, Procedia Computer Science, Vol 191, 2021, pp 425-430, https://doi.org/10.1016/j.procs.2021.07.053..   DOI
10 M. Tariq, H. Majeed, M.O. Beg, F.A. Khan, A. Derhab Accurate detection of sitting posture activities in a secure iot based assisted living environment Future Generation Computer Systems, 92 (2019), pp. 745-757   DOI
11 G. M. Koien, "Reflections on trust in devices: an informal survey of human trust in an internet-of-things context," Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011.   DOI
12 Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021)   DOI
13 Babaei A, Schiele G (2019) Physical unclonable functions in the Internet of Things: state of the art and open challenges. Sensors 19(14):3208   DOI
14 Aldaej A (2019) Enhancing cyber security in modern Internet of things (IoT) using intrusion prevention algorithm for IoT (IPAI). IEEE Access. https://doi.org/10.1109/ACCESS.2019.2893445   DOI
15 Alshehri MD, Hussain FK (2019) A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT). Computing 101(7):791-818   DOI
16 Yuchong Li, Qinghui Liu, A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, Energy Reports, Volume 7, 2021, Pages 8176-8186   DOI
17 Keskin, O.F.; Caramancion, K.M.; Tatar, I.; Raza, O.; Tatar, U. Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports. Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168   DOI
18 Ogbanufe O, Enhancing end-user roles in information security: Exploring the setting, situation, and identity, Comput Secur., 108 (2021), Article 102340.
19 Niraja K.S., Srinivasa Rao S, A hybrid algorithm design for near real time detection cyber attacks from compromised devices to enhance IoT security, Mater. Today: Proc. (2021
20 J. Fuller, B. Ramsey, Rogue Z-Wave Controllers: A Persistent Attack Channel, in: 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseApp), 2015, pp. 734-741
21 Boyes, Hugh, Bil Hallaq, Joe Cunningham, and Tim Watson. 2018. The Industrial Internet of Things (IIoT): An Analysis Framework. Computers in Industry 101: 1-12.   DOI
22 A. Prakash, M. Satish, T. Sri Sai Bhargav, N. Bhalaji, Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture, Procedia Computer Science, Vol 87, 2016, pp. 275-280.   DOI
23 Distributed Denialof-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms in Advance Computing Conference, 2009. IACC 2009. IEEE International (2009), pp. 1275-1280
24 Jonathan D. Fuller, Benjamin W. Ramsey, Mason J. Rice, John M. Pecarina, Misuse-based detection of Z-Wave network attacks, Computers & Security, Vol 64, 2017, pp 44-58,   DOI
25 Williams CM, Chaturvedi R, Chakravarthy K Cybersecurity Risks in a Pandemic J Med Internet Res 2020 vol. 22, no. 9, e23692 doi: 10.2196/23692   DOI