Skip to main content

Applications of IoT and Various Attacks on IoT

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 627))

Abstract

Internet of Things (IoT) is the unification of digital/technical world with the real world and its applications, enabling the ease of communication between people, devices, processes, and objects present in the surroundings. IoT is the newest technological modernization with the ability to boost efficiency, enhance environmental sustainability, and upgrade security covering numerous evolving domains as well as assist in smoothing the everyday task and activities. The IoT researches accomplished till date certify the enormous progress in the field of Internet of Things. IoT applications are progressively fabricating their existence in nearly every sector surrounding humans. Few of the omnipresent applications of IoT are smart homes and city, smart health care, hi-tech wearable’s, and smart agriculture which are further elaborated in the survey. This survey paper presents an exhaustive description of applications of IoT, with the possible vulnerabilities and attacks on numerous IoT applications. Thus, the study also includes the mitigation methods to prevents these attacks and attain trustworthy and reliable IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ghazal TM, Hasan MK, Alshurideh MT, Alzoubi HM, Ahmad M, Akbar SS, Al Kurdi B, Akour IA (2021) IoT for smart cities: machine learning approaches in smart healthcare—a review. Fut Internet 13(8):218

    Google Scholar 

  2. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852

    Google Scholar 

  3. Dian FJ, Vahidnia R, Rahmati A (2020) Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: a survey. IEEE Access 8:69200–69211

    Google Scholar 

  4. Ghazal TM, Hasan MK, Hassan R, Islam S, Abdullah HS, Afifi MA, Kalra D (2020) Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications. Solid State Technol 63(1s):2513–2521

    Google Scholar 

  5. Ahamed J, Rajan AV (2016) Internet of Things (IoT): application systems and security vulnerabilities. In: 2016 5th International conference on electronic devices, systems and applications (ICEDSA). IEEE, pp 1–5

    Google Scholar 

  6. Mohammad Z, Abu Qattam T, Saleh K (2019) Security weaknesses and attacks on the Internet of Things applications. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT). IEEE, pp 431–436

    Google Scholar 

  7. Alsaidi A, Kausar F (2018) Security attacks and countermeasures on cloud assisted IoT applications. In: 2018 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 213–217

    Google Scholar 

  8. Du J, Jiang C, Gelenbe E, Xu L, Li J, Ren Y (2018) Distributed data privacy preservation in IoT applications. IEEE Wirel Commun 25(6):68–76

    Google Scholar 

  9. Jabbar WA, Alsibai MH, Amran NSS, Mahayadin SK (2018) Design and implementation of IoT-based automation system for smart home. In: 2018 International symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6

    Google Scholar 

  10. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84

    Article  Google Scholar 

  11. Chehida S, Baouya A, Bozga M, Bensalem S (2020) Exploration of impactful countermeasures on IoT attacks. In: 2020 9th Mediterranean conference on embedded computing (MECO). IEEE, pp 1–4

    Google Scholar 

  12. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

    Article  Google Scholar 

  13. Bhattarai S, Wang Y (2018) End-to-end trust and security for Internet of Things applications. Computer 51(4):20–27

    Article  Google Scholar 

  14. Rajendran G, Ragul Nivash RS, Parthy PP, Balamurugan S (2019) Modern security threats in the Internet of Things (IoT): attacks and countermeasures. In: 2019 International Carnahan conference on security technology (ICCST). IEEE, pp 1–6

    Google Scholar 

  15. Abdelmaboud A, Ahmed AIA, Abaker M, Eisa TAE, Albasheer H, Ghorashi SA, Karim FK (2022) Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions. Electronics 11(4):630

    Google Scholar 

  16. Mishra N, Pandya S (2021) Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access

    Google Scholar 

  17. Podder P, Mondal M, Bharati S, Paul PK (2021) Review on the security threats of internet of things. arXiv preprint arXiv:2101.05614

  18. Nagy R, Németh K, Papp D, Buttyán L (2021) Rootkit detection on embedded IoT devices. Acta Cybernet 25(2):369–400

    Article  Google Scholar 

  19. Ali I, Ahmed AIA, Almogren A, Raza MA, Shah SA, Khan A, Gani A (2020) Systematic literature review on IoT-based botnet attack. IEEE Access 8:212220–212232

    Google Scholar 

  20. Alhammadi NAM, Zaboon KH (2022) A review of IoT applications, attacks and its recent defense methods. J Glob Sci Res 7(3):2128–2134

    Google Scholar 

  21. Kaur V, Rani S (2017) Prevention/detection methods of black hole attack: a review. Advances in wireless and mobile communications. ISSN 0973-6972 10:747–756

    Google Scholar 

  22. Kassim MRM (2020) Iot applications in smart agriculture: Issues and challenges. In: 2020 IEEE conference on open systems (ICOS). IEEE, pp 19–24

    Google Scholar 

  23. Alam T (2021) Cloud-based IoT applications and their roles in smart cities. Smart Cities 4(3):1196–1219

    Article  Google Scholar 

  24. Friha O, Ferrag MA, Shu L, Maglaras LA, Wang X (2021) Internet of Things for the future of smart agriculture: a comprehensive survey of emerging technologies. IEEE CAA J Autom Sinica 8(4):718–752

    Google Scholar 

  25. Khan RL, Priyanshu D (2022) Internet of Things-based human healthcare monitoring system. In: Soft computing: theories and applications. Springer, Singapore, pp 869–879

    Google Scholar 

  26. Choubey DK, Gupta A, Suvvari S, Pathak N (2022) IoT driven precision cultivation for diverse Indian climate conditions. In: Soft computing: theories and applications 2022. Springer, Singapore, pp 275–282

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumeet Dhillon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dhillon, S., Mishra, N., Shakya, D.K. (2023). Applications of IoT and Various Attacks on IoT. In: Kumar, R., Verma, A.K., Sharma, T.K., Verma, O.P., Sharma, S. (eds) Soft Computing: Theories and Applications. Lecture Notes in Networks and Systems, vol 627. Springer, Singapore. https://doi.org/10.1007/978-981-19-9858-4_60

Download citation

Publish with us

Policies and ethics