About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Big Data Technologies and Applications. 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings

Research Article

IoT Attacks Countermeasures: Systematic Review and Future Research Direction

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-52265-9_7,
        author={Joshua Teddy Ibibo},
        title={IoT Attacks Countermeasures: Systematic Review and Future Research Direction},
        proceedings={Big Data Technologies and Applications. 13th EAI International Conference, BDTA 2023, Edinburgh, UK, August 23-24, 2023, Proceedings},
        proceedings_a={BDTA},
        year={2024},
        month={1},
        keywords={IoT Attacks Countermeasures privacy security IoT application},
        doi={10.1007/978-3-031-52265-9_7}
    }
    
  • Joshua Teddy Ibibo
    Year: 2024
    IoT Attacks Countermeasures: Systematic Review and Future Research Direction
    BDTA
    Springer
    DOI: 10.1007/978-3-031-52265-9_7
Joshua Teddy Ibibo1,*
  • 1: School of Computing
*Contact email: joshua.ibibo@napier.ac.uk

Abstract

In order to connect heterogeneous nodes, objects, and smart devices of a network, such as e-transportation, e-health, e-education, e-home, and e-grip, the Internet of Things (IoT) has emerged as an efficient technology. This technology makes things easier, safer, and more productive for us all. These nodes are often resource-constrained because of their involvement in a huge network of heterogeneous devices, making them the weakest link in the chain for a cyber attacker because they generate enormous amounts of data despite a number of limitations, including memory, power, and low processor of the device. So these limitations make IoT devices vulnerable to a variety of security attacks. In this paper, we presented a survey on attacks IoT countermeasures, systematic reviews, and analyses of various IoT attacks that are occurring, classified them, discussed their defences, and identified the most significant IoT attacks countermeasures. A state-of-the-art analysis of the different attacks, including their effectiveness and degree of damage in IoT devices, has been given and contrasted. We identify the advantages and disadvantages of IoT Attack Countermeasures and proposed a Novel IoT Attack Countermeasures. Finally, we identify the open-research issue in the domain and provide directions for future research.

Keywords
IoT Attacks Countermeasures privacy security IoT application
Published
2024-01-31
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-52265-9_7
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL