ABSTRACT

Contents 8.1 Introduction ................................................................................................................... 223 8.2 IoT Technologies ............................................................................................................ 223 8.3 Core IoT Technologies ................................................................................................... 224

8.3.1 Radio-Frequency Identification........................................................................... 224 8.3.1.1 Passive RFID ........................................................................................ 224 8.3.1.2 Active RFID ......................................................................................... 224

8.3.2 Wireless Sensor Networks ................................................................................... 224 8.3.3 Near Field Communication ................................................................................ 224

8.4 Supporting IoT Technologies ......................................................................................... 225 8.5 Security Issues in IoT ..................................................................................................... 225

8.5.1 Insecure Architecture .......................................................................................... 226 8.5.1.1 Security Issues in Perception Layer ....................................................... 226 8.5.1.2 Security Issues in Network Layer .......................................................... 226 8.5.1.3 Security Issues in Application Layer...................................................... 227

8.6 Vulnerabilities in ICT Technologies ............................................................................... 227 8.6.1 Eavesdropping Attacks ........................................................................................ 227 8.6.2 Spoofing Attacks ................................................................................................. 227 8.6.3 Denial-of-Service Attacks ................................................................................... 228 8.6.4 Distributed Denial-of-Service Attacks ................................................................ 228

8.7 Vulnerabilities in IoT Protocols ...................................................................................... 229 8.7.1 DoS Attacks on L1-L3 Communication Protocol ............................................... 229

Abstract: A new concept that has changed the basic ideology of the traditional Internet by connecting things on a global scale is the Internet of Things (IoT). It is an extension of the Internet by the inclusion of world objects blended with a power to offer smart services to this global village. The core idea of this technology is closely related to the cyber-physical system (CPS) that allows the physical world to amalgamate with the virtual world leading to an IoT. In different ways, the IoT technology is involved either directly or indirectly in human daily life. The connection of billions of heterogeneous things in an always-on fashion makes this technology vulnerable and a high security risk. The increasing dependence on this omnipresent technology also highlights major security issues. Security is one of the biggest challenges facing this technology and no practical implementation can prevail if security issues are not handled properly. In this chapter, we highlight the principal security issues, vulnerabilities, and challenges related to the IoT devices. The chapter also explores the available methods and solutions in the IoT technology.