Abstract
Internet of Things (IoT) is the unification of digital/technical world with the real world and its applications, enabling the ease of communication between people, devices, processes, and objects present in the surroundings. IoT is the newest technological modernization with the ability to boost efficiency, enhance environmental sustainability, and upgrade security covering numerous evolving domains as well as assist in smoothing the everyday task and activities. The IoT researches accomplished till date certify the enormous progress in the field of Internet of Things. IoT applications are progressively fabricating their existence in nearly every sector surrounding humans. Few of the omnipresent applications of IoT are smart homes and city, smart health care, hi-tech wearable’s, and smart agriculture which are further elaborated in the survey. This survey paper presents an exhaustive description of applications of IoT, with the possible vulnerabilities and attacks on numerous IoT applications. Thus, the study also includes the mitigation methods to prevents these attacks and attain trustworthy and reliable IoT applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ghazal TM, Hasan MK, Alshurideh MT, Alzoubi HM, Ahmad M, Akbar SS, Al Kurdi B, Akour IA (2021) IoT for smart cities: machine learning approaches in smart healthcare—a review. Fut Internet 13(8):218
Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852
Dian FJ, Vahidnia R, Rahmati A (2020) Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: a survey. IEEE Access 8:69200–69211
Ghazal TM, Hasan MK, Hassan R, Islam S, Abdullah HS, Afifi MA, Kalra D (2020) Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications. Solid State Technol 63(1s):2513–2521
Ahamed J, Rajan AV (2016) Internet of Things (IoT): application systems and security vulnerabilities. In: 2016 5th International conference on electronic devices, systems and applications (ICEDSA). IEEE, pp 1–5
Mohammad Z, Abu Qattam T, Saleh K (2019) Security weaknesses and attacks on the Internet of Things applications. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT). IEEE, pp 431–436
Alsaidi A, Kausar F (2018) Security attacks and countermeasures on cloud assisted IoT applications. In: 2018 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 213–217
Du J, Jiang C, Gelenbe E, Xu L, Li J, Ren Y (2018) Distributed data privacy preservation in IoT applications. IEEE Wirel Commun 25(6):68–76
Jabbar WA, Alsibai MH, Amran NSS, Mahayadin SK (2018) Design and implementation of IoT-based automation system for smart home. In: 2018 International symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84
Chehida S, Baouya A, Bozga M, Bensalem S (2020) Exploration of impactful countermeasures on IoT attacks. In: 2020 9th Mediterranean conference on embedded computing (MECO). IEEE, pp 1–4
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
Bhattarai S, Wang Y (2018) End-to-end trust and security for Internet of Things applications. Computer 51(4):20–27
Rajendran G, Ragul Nivash RS, Parthy PP, Balamurugan S (2019) Modern security threats in the Internet of Things (IoT): attacks and countermeasures. In: 2019 International Carnahan conference on security technology (ICCST). IEEE, pp 1–6
Abdelmaboud A, Ahmed AIA, Abaker M, Eisa TAE, Albasheer H, Ghorashi SA, Karim FK (2022) Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions. Electronics 11(4):630
Mishra N, Pandya S (2021) Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access
Podder P, Mondal M, Bharati S, Paul PK (2021) Review on the security threats of internet of things. arXiv preprint arXiv:2101.05614
Nagy R, Németh K, Papp D, Buttyán L (2021) Rootkit detection on embedded IoT devices. Acta Cybernet 25(2):369–400
Ali I, Ahmed AIA, Almogren A, Raza MA, Shah SA, Khan A, Gani A (2020) Systematic literature review on IoT-based botnet attack. IEEE Access 8:212220–212232
Alhammadi NAM, Zaboon KH (2022) A review of IoT applications, attacks and its recent defense methods. J Glob Sci Res 7(3):2128–2134
Kaur V, Rani S (2017) Prevention/detection methods of black hole attack: a review. Advances in wireless and mobile communications. ISSN 0973-6972 10:747–756
Kassim MRM (2020) Iot applications in smart agriculture: Issues and challenges. In: 2020 IEEE conference on open systems (ICOS). IEEE, pp 19–24
Alam T (2021) Cloud-based IoT applications and their roles in smart cities. Smart Cities 4(3):1196–1219
Friha O, Ferrag MA, Shu L, Maglaras LA, Wang X (2021) Internet of Things for the future of smart agriculture: a comprehensive survey of emerging technologies. IEEE CAA J Autom Sinica 8(4):718–752
Khan RL, Priyanshu D (2022) Internet of Things-based human healthcare monitoring system. In: Soft computing: theories and applications. Springer, Singapore, pp 869–879
Choubey DK, Gupta A, Suvvari S, Pathak N (2022) IoT driven precision cultivation for diverse Indian climate conditions. In: Soft computing: theories and applications 2022. Springer, Singapore, pp 275–282
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhillon, S., Mishra, N., Shakya, D.K. (2023). Applications of IoT and Various Attacks on IoT. In: Kumar, R., Verma, A.K., Sharma, T.K., Verma, O.P., Sharma, S. (eds) Soft Computing: Theories and Applications. Lecture Notes in Networks and Systems, vol 627. Springer, Singapore. https://doi.org/10.1007/978-981-19-9858-4_60
Download citation
DOI: https://doi.org/10.1007/978-981-19-9858-4_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9857-7
Online ISBN: 978-981-19-9858-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)