IoT Security: A review of vulnerabilities and security protocols


Ravi Kiran Varma P,Priyanka M,Vamsi Krishna BS ,Subba Raju KV,



Internet of Things,IoT,Vulnerabilities,,ecurity Issues,Protocols,IoT Security,


Internet of Things (IoT) technology is ubiquitous. In the past decade there was an exponential growth in IoT deployments, so as the potential danger of attacks and threats using IoT devices. The privacy of an individual can be breached and the sensitive information can be disclosed if proper security measures are not in place in the IoT device. A patient monitoring system using an IoT device is vulnerable to many such threats. Even centrifuges and atomic reactors were fallen victim of an industrial security breach caused by popular malware like slammer and Stuxnet. Vehicular and personal gadgets are vulnerable to IoT vulnerabilities that may lead to a leak of information to potential insurance companies and thereby increase of premiums. Our own homes including energy meters, IP cameras, and security monitoring systems may be taken control by hackers if there exist vulnerabilities in the IoT devices. This paper, discusses on IoT vulnerabilities by surveying several sectors of IoT and proposes several security measures that can be implemented to minimize those vulnerabilities.


I.Ahmad-Reza Sadeghi, C. Wachsmann and M. Waidner, “Security and privacy challenges in industrial Internet of Things,” San Francisco, CA, USA, 2015.

II.AndreaZanella, NicolaBui and AngeloCastellani, “Internet of Things for Smart Cities,” vol. 1, no. 1, 2014.

III.D. MOORE, V. PAXSON and STEFAN SAVAGE, “Inside the Slammer Worm,” 2003.

IV.D. Singh, G. Tripathi and A. J. Jara, “A survey of Internet-of-Things: Future vision, architecture, challenges and services,” Seoul, South Korea, 2014.

V.Jason Bau, Elie Bursztein, Divij Gupta and John Mitchell, “State of the Art: Automated Black-Box Web Application Vulnerability Testing,” Berkeley, California, USA, 2010.

VI.Jinesh Ahamed and Amala V. Rajan, “Internet of Things (IoT): Application systems and security vulnerabilities,” Ras Al Khaimah, United Arab Emirates, 2016

VII.Kevin Poulsen, “Slammer worm crashed Ohio nuke plant network,” 2003.

VIII.M. Muneer Bani Yassein, Mohammed Q. Shatnawi and Dua’ Al-zoubi, “Application layer protocols for the Internet of Things: A survey,” Agadir, Morocco, 2016.

IX.NausheenFarha and Sayyada Hajera Begum, “Healthcare IoT: Benefits, vulnerabilities and solutions,” Coimbatore, India, 2018.

X.P Ravi Kiran Varma, Kotari Prudvi Raj and KV Subba Raju, “Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms,” in IEEE International Conference on IoT in Social, Mobile, Analytics and Cloud(I-SMAC), Tiruchengode, 2017.

XI.P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” 2017.XII.Rahat Masood, Um-e-Ghazia and Dr. Zahid Anwar, “SWAM: Stuxnet Worm Analysis in Metasploit,” Islamabad, Pakistan, 2011.

XIII.Ravi Kiran Varma Penmatsa and Padmaprabha Kakarlapudi, “Web phishing detection: feature selection using rough sets and ant colony optimisation,” International Journal of Intelligent Systems Design and Computing, vol. 2, no. 2, pp. 102-113, 2018.

XIV.S. M. Riazul Islam, Daehan Kwak, Kabir MD. Humaun and .., “The Internet of Things for Health Care: A Comprehensive Survey,” vol. 3, 2015.

XV.Simone Cirani, Luca Davoli, Gianluigi Ferrari and …, “A Scalable and Self-Configuring Architecture for Service Discovery in the Internet ofThings,” vol. 1, no. 5, 2014.

XVI.Smruti R. Sarangi and Pallavi Sethi, “Internet of Things: Architectures, Protocols, and Applications,” 2017.XVII.Tobias Heer, Oscar Garcia-Morchon and R. Hummen, “Security Challenges in the IP-based Internet of Things,” 2011. XVIII.Tobias Heer, Oscar Garcia-Morchon and Sye Loong Keoh, “Security Challenges in the IP-based Internet of Things,” vol. 61, no. 3, 2011.

XIX.Wei Zhou, Y. Yan Jia, Anni Peng and Yuqing Zhang, “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved,” 2018.

XX.Woo-Sik Bae, “Verifying a secure authentication protocol for IoT medical devices,” Boryeong,Korea, 2017.

Ravi Kiran Varma P, Priyanka M, Vamsi Krishna BS , Subba Raju KV View Download