One of the most hotly debated topics right now is the Internet of Things (IoT). IoT is a global network of physically connected things that are linked to one another online. In SIoT, social relationships between items exist in a similar manner to how they do in social interactions between people. SIoT is shown to have a number of flaws that could endanger the technology. IoT aims to connect a few trillion of the intelligent objects already present in our world. These objects can collect, analyse, and communicate information about themselves and their environment every day and are individually addressable. Internet is connected with a numerous wireless networks with intelligent and smart devices continuously send data to recent advancements in technology. Which have since prompted the creation of smart sensor nodes and RFIDs (Radio-frequency identification). As a result, it is highly challenging to guarantee IoT security and privacy. Security is the top worry for a variety of current and future IoT applications. Resource-constrained devices like smart phones, WSNs (Wireless Sensor Networks), RFIDs, and other gadgets are essentially the main elements of IoT network. IoT security measures allow unauthorized access to data or other items while preventing changes or destruction. Privacy laws uphold the right to decide how data is gathered and used. In this article key issues of IoT like Confidentiality, Integrity, Authentication and Availability are briefly examined. This study makes an effort to examine various security attack types, their influence on entities, and the associated depth.

1.
Abdelghani
,
W.
,
Zayani
,
C. A.
,
Amous
,
I.
, &
Sèdes
,
F.
(
2016
, September).
Trust management in social internet of things: a survey
. In
Conference on e-Business, e-Services and e-Society
(pp.
430
441
).
Springer
,
Cham
.
2.
Ammar
,
M.
,
Russello
,
G.
, &
Crispo
,
B.
(
2018
).
Internet of things: A survey on the security of IoT frameworks
.
Journal of Information Security and Applications
,
38
,
8
27
3.
Andrea
,
C.
Chrysostomou
and
G.
Hadjichristofi
, “Internet of Things: Security vulnerabilities and challenges,”
2015 IEEE Symposium on Computers and Communication (ISCC)
, pp.
180
187
,
Larnaca
,
2015
.
4.
A.
Mitrokotsa
,
M. R.
Rieback
, and
A. S.
Tanenbaum
, “
Classification of RFID attacks
Gen
15693
(
2010
).
5.
Atzori
,
L.
,
Iera
,
A.
, &
Morabito
,
G.
(
2010
).
The internet of things: A survey
.
Journal of Computer and Telecommunications Networking
,
54
(
15
),
2787
2805
.
6.
Chanal
,
P. M.
, &
Kakkasageri
,
M. S.
(
2020
).
Security and privacy in IOT: a survey
.
Wireless Personal Communications
,
115
(
2
),
16671693
.
7.
D.
Singh
,
G.
Tripathi
, and
A.J.
Jara
, “A survey of Internet of-things: Future vision, architecture, challenges and services,”
2014 IEEE World Forum on Internet of Things (WF-IoT)
, pp.
287
292
,
IEEE
,
2014
.
8.
Deogirikar
,
J.
, &
Vidhate
,
A.
(
2017
, February). Security attacks in IoT: A survey. In
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)
(pp.
32
37
).
IEEE
.
9.
F.
Kandah
,
Y.
Singh
,
W.
Zhang
and
C.
Wang
, “
Mitigating colluding injected attack using monitoring verification in mobile ad -hoc networks
”,
Security and Communication Networks
, pp.
1939
0122
,
2013
.
10.
Gurunath
,
R.
,
Agarwal
,
M.
,
Nandi
,
A.
, &
Samanta
,
D.
(
2018
, August). An overview: security issue in IoT network. In
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference on
(pp.
104
107
).
IEEE
.
11.
H.
Li
,
Y.
Chen
and
Z.
He
, “
The Survey of RFID Attacks and Defenses
,”
8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Shanghai
,
2012
,.
12.
H.
Suo
,
J.
Wan
,
C.
Zou
, and
J.
Liu
, “
Security in the internet of things: a review
,”
2012 International Conference on Computer Science and Electronics Engineering (ICCSEE)
, vol.
3
, IEEE, pp.
648
-
651
,2012.
13.
Hossain
,
M. M.
,
Fotouhi
,
M.
, &
Hasan
,
R.
(
2015
). Towards an analysis of security issues, challenges, and open problems in the internet of things. In
15th IEEE world congress
(pp.
1
8
),
Chicago
.
14.
Jain
,
Pragya
and
Sardana
,
Anjali
, “
Defending against Internet Worms Using Honeyfarm
”,
Proceedings of the CUBE International Information Technology Conference
, pp.
795
800
,
2012
.
15.
Kandah
,
Farah
,
Y.
Singh
, and
C.
Wang
, “
Colluding injected attack in mobile ad-hoc networks
”,
IEEE Conference on Computer Communication Workshops (INFOCOM WKSHPS)
,
2011
.
16.
Kaur
,
Damandeep
, and
P.
Singh
,
"Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack
”,
International Journal on Network Security
5
.
1
(
2014
):
62
.
17.
Kelsey
,
John
, et al. “
Side channel cryptanalysis of product ciphers
.”
European Symposium on Research in Computer Security.
Springer Berlin Heidelberg
,
1998
.
18.
Kocher
,
Paul
C.
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
.”
Annual International Cryptology Conference.
Springer Berlin Heidelberg
,
1996
.
19.
Kocher
,
Paul
, et al. “
Introduction to differential power analysis
.”
Journal of Cryptographic Engineering 1.1
, pp.
5
27
, (
2011
).
20.
L.
Patra
and
U. P.
Rao
, “Internet of Things — Architecture, applications, security and other major challenges,”
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
, pp.
1201
1206
,
New Delhi, India
,
2016
,.
21.
Li
,
Hong
,
Y.
Chen
, and
Z.
He
. "
The Survey of RFID Attacks and Defenses
."
8th International Conference on IEEE Wireless Communications, Networking and Mobile Computing (WiCOM)
,
2012
.
22.
Li
,
L.
(
2012
, May).
Study on security architecture in the Internet of Things
. In
Proceedings of 2012 international conference on measurement, information and control
(Vol.
1
, pp.
374
377
). IEEE.
23.
M.U.
Farooq
,
M.
Waseem
,
A.
Khairi
and
S.
Mazhar
A Critical Analysis on the Security Concerns of Internet of Things (IoT
)”,
International Journal of Computer Applications(0975 8887)
, Volume
111
- No.
7
, February
2015
.
24.
Md. I.
Abdullah
,
M. M.
Rahman
and
M. C.
Roy
, “
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
I. J. Computer Network and Information Security
, pp.
50
56
,
2015
.
25.
Reed
,
Damon
, “
Applying the OSI seven layernetwork model to information security
”,
SANS GIAC GSEC Practical Assignment Version 1.4 b Option One
2003
.
26.
S.N
Uke
,
A.R
Mahajan
,
R.C
Thool
UML Modeling of Physical and Data Link Layer Security Attacks in WSN
”,
International Journal of Computer Applications
, Volume
70
– No.
11
, May
2013
.
27.
Sathish
Kumar
, J., &
Patel
,
D. R.
(
2014
).
A survey on internet of things: Security and privacy issues
.
Journal of Computer Applications
,
90
(
11
),
2
28.
Suo
,
H.
,
Wan
,
J.
,
Zou
,
C.
, &
Liu
,
J.
(
2012
).
Security in the internet of things: A review
. In
Proceedings of The IEEE international conference on computer science and electronics engineering
(Vol.
3
. pp.
648
651
),
China
.
29.
T.
Yousuf
,
R.
Mahmoud
,
F.
Aloul
,
I.
Zualkernan
, “
Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures
”,
International Journal for Information Security Research (IJISR)
, Volume
5
, Issue
4
, December
2015
.
30.
Wahid
,
Abdul
,
P.
Kumar
, “
A Survey on attacks, Challenges and Security Mechanism In wireless Sensor Network
”,
JIRST-International Journal for Research in Science & Technology
, Volume
1
, Issue
8
, pp.
189
196
,January
2015
.
31.
Yang
,
G.
,
Xu
,
J.
,
Chen
,
W.
,
Qi
,
Z. H.
, &
Wang
,
H. Y.
(
2010
).
Security characteristic and technology in the internet of things
.
Journal of Nanjing University of Posts and Telecommunications
,
30
(
4
).
32.
Yang
,
Y.
,
Wu
,
L.
,
Yin
,
G.
,
Li
,
L.
, &
Zhao
,
H.
(
2017
).
A survey on security and privacy issues in internet of things
.
Journal of IEEE Internet of Things
,
4
(
5
),
1250
1258
.
33.
Zhang
,
G.
,
Kou
,
L.
,
Zhang
,
L.
,
Liu
,
C.
,
Da
,
Q.
, &
Sun
,
J.
(
2017
).
A new digital watermarking method for data integrity protection in the perception layer of IoT
.
Journal of Security and Communication Networks
,
2017
,
1
12
.
34.
Zulkifli
,
M.
Zaid
W.
Mohd
, “
Attack on Cryptography
”, (
2008
).
This content is only available via PDF.
You do not currently have access to this content.