Research Article | | Peer-Reviewed

Attacks, Challenges, and Countermeasures for an Integrated IoT Framework

Received: 31 May 2024     Accepted: 1 July 2024     Published: 15 August 2024
Views:       Downloads:
Abstract

The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.

Published in Internet of Things and Cloud Computing (Volume 12, Issue 2)
DOI 10.11648/j.iotcc.20241202.12
Page(s) 28-39
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

IoT, Security, Framework, Attacks, Network, Sensors

References
[1] W. T. Sung, I. V. Devi, S. J. Hsiao, and F. N. Fadillah, “Smart Garbage Bin Based on AIoT,” Intell. Autom. Soft Comput., vol. 32, no. 3, pp. 1387–1401, 2022,
[2] M. Jingyao, Z. Gang, and Z. Ling, “Governance mechanisms implementation in the evolution of digital platforms: a case study of the Internet of Things platform,” R D Manag., vol. 52, no. 3, pp. 498–516, 2022,
[3] K. P. Seng, L. M. Ang, and E. Ngharamike, “Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks,” Int. J. Distrib. Sens. Networks, vol. 18, no. 3, 2022,
[4] P. Title and T. Name, “Presentation Schedule,” pp. 1–13, 2023,
[5] K. Boikanyo, A. M. Zungeru, B. Sigweni, A. Yahya, and C. Lebekwe, “Remote patient monitoring systems: Applications, architecture, and challenges,” Sci. African, vol. 20, no. March, p. e01638, 2023,
[6] A. A. Pise et al., “Enabling Artificial Intelligence of Things (AIoT) Healthcare Architectures and Listing Security Issues,” Comput. Intell. Neurosci., vol. 2022, pp. 1–14, 2022,
[7] A. Bano, I. Ud Din, and A. A. Al-Huqail, “AIoT-Based Smart Bin for Real-Time Monitoring and Management of Solid Waste,” Sci. Program., vol. 2020, 2020,
[8] A. Okubanjo, A. Okandeji, and E. Daniel, “Smart Bin and IoT: A Sustainable Future for Waste Management System in,” J. Sci., vol. 37, no. 1, 2023,
[9] M. Tauseef, M. R. Kounte, A. H. Nalband, and M. R. Ahmed, “Exploring the Joint Potential of Blockchain and AI for Securing Internet of Things,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 4, pp. 885–895, 2023,
[10] A. R. Khan, I. Abunadi, B. Alghofaily, H. Ali, and T. Saba, “Automatic Diagnosis of Rice Leaves Diseases Using Hybrid Deep Learning Model,” J. Adv. Inf. Technol., vol. 14, no. 3, pp. 418–425, 2023,
[11] J. P. S. Piest, Y. Masuda, and M. E. Iacob, “Digital Architectures Under Society 5.0: An Enterprise Architecture Perspective,” Lect. Notes Bus. Inf. Process., vol. 466 LNBIP, no. August, pp. 5–24, 2023,
[12] P. Singhal, P. Sharma, and D. Arora, “An approach towards preventing IoT based sybil attack based on contiki framework through cooja simulator,” Int. J. Eng. Technol., vol. 7, no. 2.8, p. 261, 2018,
[13] V. K. Patil, V. R. Pawar, S. P. Kulkarni, T. A. Mehta, and N. R. Khare, “Real Time Emotion Recognition with AD8232 ECG Sensor for Classwise Performance Evaluation of Machine Learning Methods,” Int. J. Eng. Trans. C Asp., vol. 36, no. 6, pp. 1040–1047, 2023,
[14] Q. Zhang et al., “Wearable Triboelectric Sensors Enabled Gait Analysis and Waist Motion Capture for IoT-Based Smart Healthcare Applications,” Adv. Sci., vol. 9, no. 4, pp. 1–13, 2022,
[15] D. Muhammed, E. Ahvar, S. Ahvar, and M. Trocan, “A User-friendly AIoT-Based Crop Recommendation system (UACR): concept and architecture,” Proc. - 16th Int. Conf. Signal-Image Technol. Internet-Based Syst. SITIS 2022, no. April 2023, pp. 569–576, 2022,
[16] Y. J. Lin, Y. C. Chen, J. Y. Zheng, D. W. Shao, D. Chu, and H. T. Yang, “Blockchain-Based Intelligent Charging Station Management System Platform,” IEEE Access, vol. 10, no. September, pp. 101936–101956, 2022,
[17] Z. Zhang, F. Wen, Z. Sun, X. Guo, T. He, and C. Lee, “Artificial Intelligence‐Enabled Sensing Technologies in the 5G/Internet of Things Era: From Virtual Reality/Augmented Reality to the Digital Twin,” Adv. Intell. Syst., vol. 4, no. 7, p. 2100228, 2022,
[18] Z. Boulouard, M. Ouaissa, M. Ouaissa, and S. El Himer, AI and IoT for Sustainable Development in Emerging Countries, vol. 105, no. January. 2022.
[19] A. Chauhan, M. Bahadir, and B. Teichgräber, “Sc Pt Ac,” Water Res., 2017, [Online]. Available:
[20] M. De Donno, N. Dragoni, A. Giaretta, and A. Spognardi, “DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation,” Secur. Commun. Networks, vol. 2018, 2018,
[21] M. A. R. Abdeen, I. A. Nemer, T. R. Sheltami, M. H. Ahmed, and M. Elnainay, “A Hierarchical Algorithm for In-city Parking Allocation Based on Open Street Map and AnyLogic Software,” Arab. J. Sci. Eng., 2023,
[22] P. Knebel, “An Artificial Intelligence of Things based Method for Early Detection of Bark Beetle Infested Trees,” Lect. Notes Informatics (LNI), Proc. - Ser. Gesellschaft fur Inform., vol. P-328, pp. 111–120, 2022.
[23] K. Ning, “Data-driven artificial intelligence techniques in renewable energy system,” no. 1999, 2021, [Online]. Available:
[24] C. Chakraborty, M. R. Khosravi, S. H. Ahmed, and J. J. P. C. Rodrigues, “Guest Editorial AIoMT-Enabled Medical Sensors for Remote Patient Monitoring and Body-Area Interfacing: Design and Implementation, Practical Use, and Real Measurements and Patient Monitoring,” IEEE J. Biomed. Heal. Informatics, vol. 26, no. 12, pp. 5769–5771, 2022,
[25] A. H. Hassan, R. bin Sulaiman, M. A. Abdulgabber, and H. Kahtan, “Balancing Technological Advances with User Needs: User-centered Principles for AI-Driven Smart City Healthcare Monitoring,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 3, pp. 365–376, 2023,
[26] Y. J. Lin, Y. C. Chen, J. Y. Zheng, D. Chu, D. W. Shao, and H. T. Yang, “Blockchain Power Trading and Energy Management Platform,” IEEE Access, vol. 10, no. June, pp. 75932–75948, 2022,
[27] M.-L. Tham, Y. J. Wong, B.-H. Kwan, X. H. Ng, and Y. Owada, Artificial Intelligence of Things (AIoT) for Disaster Monitoring using Wireless Mesh Network, vol. 1, no. 1. Association for Computing Machinery, 2023.
[28] M. Wang, F. Zhang, L. Ma, and Y. Tian, “Adaptive VR Video Data Transmission Method Using Mobile Edge Computing Based on AIoT Cloud VR,” J. Sensors, vol. 2022, 2022,
[29] P. Mishra and S. Shrivastava, “Cloud AIoT based Smart Wheelchair using Module for Social Distancing, Temperature Monitoring, and Oximeter Module,” … J. Inf. Technol., vol. 7, no. 5, pp. 29–35, 2021, [Online]. Available:
[30] N. Chumuang, K. Kocento, M. Ketcham, and A. Farooq, “Design and Prototyping of Intelligent Bin by Using AIoT,” Int. Conf. Cybern. Innov. ICCI 2022, no. February, 2022,
[31] L. Lei, Y. Tan, K. Zheng, S. Liu, K. Zhang, and X. Shen, “Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges,” IEEE Commun. Surv. Tutorials, vol. 22, no. 3, pp. 1722–1760, 2020,
[32] C. Tzagkarakis, N. Petroulakis, and S. Ioannidis, “Botnet attack detection at the IoT edge based on sparse representation,” Glob. IoT Summit, GIoTS 2019 - Proc., pp. 1–6, 2019,
[33] M. Y. Hiou, “AIoT-Based Quality Control Production Line,” no. December, 2022,
[34] A. Kumar, “AIoT Technologies and Applications for Smart Environments,” AIoT Technol. Appl. Smart Environ., no. December 2022, 2022,
[35] S. E. Najafi, H. Nozari, and S. A. Edalatpanah, “Artificial intelligence of things (AIoT) and industry 4.0-based supply chain (FMCG Industry),” A Roadmap Enabling Ind. 4.0 by Artif. Intell., no. December, pp. 31–42, 2022,
[36] Y.-J. Lin, C.-W. Chuang, C.-Y. Yen, S.-H. Huang, J.-Y. Chen, and S.-Y. Lee, “An AIoT Wearable ECG Patch with Decision Tree for Arrhythmia Analysis,” 2019 IEEE Biomed. Circuits Syst. Conf., no. October 2019, pp. 1–4, 2019,
[37] G. Ng et al., “Amalgamation of smart AIoT based construction site monitoring with robotics: viAct’s extended horizon,” no. November, 2021, [Online]. Available:
[38] N. Cam-Winget, A.-R. Sadeghi, and Y. Jin, “Invited - Can IoT be secured,” Proc. 53rd Annu. Des. Autom. Conf. - DAC ’16, pp. 1–6, 2016,
[39] H. M. Zahid, “A Framework for Identification and Classification of IoT Devices for Security Analysis in Heterogeneous Network,” Wirel. Commun. Mob. Comput., vol. 2022, no. Idc, 2022,
[40] K. Ding, “Smart steel bridge construction enabled by BIM and Internet of Things in industry 4.0: A framework,” ICNSC 2018 - 15th IEEE Int. Conf. Networking, Sens. Control, pp. 1–5, 2018,
[41] A. Kumar, K. S. Kumar, M. Sharma, C. Menaka, R. Naaz, and V. Vekriya, “Machine learning in molecular communication and applications for health monitoring networks,” Soft Comput., 2023,
[42] M. C. Chiu, W. M. Yan, S. A. Bhat, and N. F. Huang, “Development of smart aquaculture farm management system using IoT and AI-based surrogate models,” J. Agric. Food Res., vol. 9, no. August, p. 100357, 2022,
[43] S. Praharaj, B. B. Mishra, U. S. Mishra, R. R. Panigrahi, and P. C. Mishra, “Role of Service Automation on Guest Experience of Hotel Industry,” Tour. Hosp. Manag., vol. 29, no. 2, pp. 265–278, 2023,
Cite This Article
  • APA Style

    Alaba, F. A., Madu, I. M., Musa, H. (2024). Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet of Things and Cloud Computing, 12(2), 28-39. https://doi.org/10.11648/j.iotcc.20241202.12

    Copy | Download

    ACS Style

    Alaba, F. A.; Madu, I. M.; Musa, H. Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet Things Cloud Comput. 2024, 12(2), 28-39. doi: 10.11648/j.iotcc.20241202.12

    Copy | Download

    AMA Style

    Alaba FA, Madu IM, Musa H. Attacks, Challenges, and Countermeasures for an Integrated IoT Framework. Internet Things Cloud Comput. 2024;12(2):28-39. doi: 10.11648/j.iotcc.20241202.12

    Copy | Download

  • @article{10.11648/j.iotcc.20241202.12,
      author = {Fadele Ayotunde Alaba and Ifeyinwa Marisa Madu and Haliru Musa},
      title = {Attacks, Challenges, and Countermeasures for an Integrated IoT Framework
    },
      journal = {Internet of Things and Cloud Computing},
      volume = {12},
      number = {2},
      pages = {28-39},
      doi = {10.11648/j.iotcc.20241202.12},
      url = {https://doi.org/10.11648/j.iotcc.20241202.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20241202.12},
      abstract = {The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.
    },
     year = {2024}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Attacks, Challenges, and Countermeasures for an Integrated IoT Framework
    
    AU  - Fadele Ayotunde Alaba
    AU  - Ifeyinwa Marisa Madu
    AU  - Haliru Musa
    Y1  - 2024/08/15
    PY  - 2024
    N1  - https://doi.org/10.11648/j.iotcc.20241202.12
    DO  - 10.11648/j.iotcc.20241202.12
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 28
    EP  - 39
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20241202.12
    AB  - The Internet of Things (IoT) has lately attracted a lot of interest owing to the fact that it has several applications in a variety of fields and makes communication easier across a variety of levels. The IoT is made up of three unique levels, which are the physical layer, the network layer, and the application layer at the most fundamental level. The purpose of this study is to examine security threats and the responses that correspond to them for each layer of the IoT architecture. Additionally, the article investigates the implications that arise from security breaches on IoT devices. In addition to providing a detailed taxonomy of attacks, this research reveals security weaknesses that are present inside each tier of the IoT network. In addition to this, the article investigates a variety of modern security frameworks, investigates probable security flaws, and investigates remedies that correspond to those vulnerabilities. In conclusion, the article proposed the "Unified Federated Security Framework," which is an all-encompassing security architecture made specifically for IoT networks. In order to facilitate the ability of users inside the security layer to acquire access to resources situated within a separate security layer, the proposed framework is based on the building of trust across the three levels. This allows users to gain access to resources without having to utilise the account of another user.
    
    VL  - 12
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Sections