A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

02/06/2018
by   Amit Kumar Sikder, et al.
0

The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of the IoT devices. One interesting emerging threat vector is the attacks that abuse the use of sensors on IoT devices. IoT devices are vulnerable to sensor-based threats due to the lack of proper security measurements available to control use of sensors by apps. By exploiting the sensors (e.g., accelerometer, gyroscope, microphone, light sensor, etc.) on an IoT device, attackers can extract information from the device, transfer malware to a device, or trigger a malicious activity to compromise the device. In this survey, we explore various threats targeting IoT devices and discuss how their sensors can be abused for malicious purposes. Specifically, we present a detailed survey about existing sensor-based threats to IoT devices and countermeasures that are developed specifically to secure the sensors of IoT devices. Furthermore, we discuss security and privacy issues of IoT devices in the context of sensor-based threats and conclude with future research directions.

READ FULL TEXT

page 9

page 14

research
03/13/2018

Securing the Internet of Things: New Perspectives and Research Challenges

The Internet of Things (IoT) realizes a vision where billions of interco...
research
07/27/2020

Testing And Hardening IoT Devices Against the Mirai Botnet

A large majority of cheap Internet of Things (IoT) devices that arrive b...
research
01/14/2022

Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android

Botnets have become a serious security threat not only to the Internet b...
research
11/22/2018

Digital Forensics for IoT and WSNs

In the last decade, wireless sensor networks (WSNs) and Internet-of-Thin...
research
03/30/2018

HCAP: A History-Based Capability System for IoT Devices

Permissions are highly sensitive in Internet-of-Things (IoT) application...
research
06/09/2023

A Survey on Cross-Architectural IoT Malware Threat Hunting

In recent years, the increase in non-Windows malware threats had turned ...
research
05/24/2023

IoT Threat Detection Testbed Using Generative Adversarial Networks

The Internet of Things(IoT) paradigm provides persistent sensing and dat...

Please sign up or login with your details

Forgot password? Click here to reset