Mitigation and Prevention Methods for Cross-Layer Attacks in IoT (Internet of Things) Devices

  • Conference paper
  • First Online:
Advancements in Smart Computing and Information Security (ASCIS 2023)

Abstract

Innumerable advantages as well as severe security challenges have been brought about by the fast spread of Internet of Things (IoT) devices across numerous industries. The emergence of cross-layer attacks, which takes advantage of flaws and exploit vulnerabilities in several tiers of the IoT technological framework, is a major concern. This is concerning and significant because there could be major repercussions, including unauthorized access, data breaches, service interruptions, and even the risk to people’s safety or vital infrastructure. It takes a comprehensive strategy that includes both proactive and reactive tactics to counter these threats. Encryption, access control, intrusion detection systems, and robust security protocols must be implemented at various IoT architecture layers as proactive measures. Moreover, frequent updates and continual observation are crucial. Reactive strategies such as incident response protocols, anomaly detection systems, and fast recovery procedures are also essential for quickly detecting and minimizing the impact of cross-layer attacks in order to quickly return to normal operation. This study scrutinizes cross-layer assaults on IoT devices, presenting a thorough set of techniques and defenses to strengthen the resistance of IoT devices against complex and multi-layered attacks, greatly advancing the understanding of cross-layer security challenges in IoT environments. Furthermore, a thorough analysis of current mitigation and prevention techniques, along with newly developed approaches to bolster IoT security are covered. The ultimate objective of the research is to further protect IoT devices against complex cross-layer attacks by offering a comprehensive approach that includes both proactive and reactive measures, thereby building a more robust and secure Internet of Things ecosystem that guarantees the availability, integrity, and confidentiality of linked devices and services by tackling these security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Spain)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 102.71
Price includes VAT (Spain)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 135.19
Price includes VAT (Spain)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashton, K.: That “Internet of Things” thing: in the real world things matter more than ideas. RFID J. 1 (2009)

    Google Scholar 

  2. Raja, S.P., Raj Kumar, T.D., Raj, V.P.: Internet of things: challenges, issues and applications. J. Circ. Syst. Comput. 27(12), 1830007 (2018)

    Google Scholar 

  3. Khanum, A., et al.: An enhanced security alert system for smart home using IOT. Indonesian J. Electr. Eng. Comput. Sci. (IJEECS) 13(1), 27–34 (2019). ISSN: 2502-4752, https://doi.org/10.11591/ijeecs.v13.i1

  4. Singh, S.: Internet of Things (IoT): security challenges, business opportunities & reference architecture for e-commerce. In: International Conference on Green Computing and Internet of Things (GCIoT), pp. 1577–1581. IEEE (2015)

    Google Scholar 

  5. https://www.statista.com/statistics/471264-number-of-connected-devices-worldwide

  6. Broadcom, Symantec, Internet Security Threat Report, vol. 24 (2020). https://www.broadcom.com/support/security-center. Accessed 11 Mar 2020

  7. Duc, T.N., Son, V.Q.: Performance analysis of anti-attack methods for RPL routing protocol in 6LoWPAN networks. In: International Symposium on Electrical and Electronics Engineering (ISEE) Computer Science, Engineering (2023)

    Google Scholar 

  8. Asati, V.K., Pilli, E.S., Vipparthi, S.K., Garg, S., Singhal, S., Pancholi, S.: RMDD: cross layer attack in Internet of Things. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)

    Google Scholar 

  9. Gajbhiye, A., Sen, D., Bhatt, A., Soni, G.: DPLPLN: detection and prevention from flooding attack in IoT. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC), Computer Science, Published in International Conference, 1 September 2020

    Google Scholar 

  10. Granjal, J., Monteiro, E., Sa Silva, J.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17(3), 1294–1312 (2015)

    Google Scholar 

  11. Sicari, S.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  12. Fu, B., **ao, Y., Deng, H.J., Zeng, H.: A survey of cross-layer designs in wireless networks. IEEE Commun. Surv. Tutorials 16(1), First Quarter 2014, 110–126 (2014)

    Google Scholar 

  13. Farooq, M.U.: A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. 111(7), 0975 8887 (2015)

    Google Scholar 

  14. Vashi, S., Ram, J., Modi, J., Verma, S., Prakash, C.: Internet of Things (IoT) a vision, architectural elements, and security issues. In: International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (2017)

    Google Scholar 

  15. Mahmoud, R.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST) (2015)

    Google Scholar 

  16. Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Bessis, N., Dobre, C. (eds.) Big Data and Internet of Things: A Roadmap for Smart Environments. SCI, vol. 546, pp. 169–186. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05029-4_7

    Chapter  Google Scholar 

  17. Hinai, S.A., Singh, A.V.: Internet of Things: architecture, security challenges and solutions. In: International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), pp. 1–4 (2017). https://doi.org/10.1109/ICTUS.2017.8

  18. Haddad Pajouh, H., Dehghantanha, A., Parizi, R.M., Aledhari, M., Karimipour, H.: A survey on Internet of Things security: requirements, challenges, and solutions. Internet Things 14, 100129 (2021)

    Article  Google Scholar 

  19. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2), Second Quarter, 52–73 (2009). https://doi.org/10.1109/SURV.2009.090205

  20. Weber, R.H.: Internet of Things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  MathSciNet  Google Scholar 

  21. Plageras, A.P., Psannis, K.E., Stergiou, C., Wang, H., Gupta, B.B.: Efficient IoT-based sensor BIG data collection–processing and analysis in smart buildings. Future Gener. Comput. Syst. 82, 349–357 (2018)

    Google Scholar 

  22. Korger, U.: QOS implications of power control and multiuser detection based cross-layer design. EURASIP J. Wirel. Commun. Networking (2011)

    Google Scholar 

  23. Golbeck, J., Ziegler, C.-N.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43(2), 460–475 (2007)

    Google Scholar 

  24. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Computer Networks 76, 146–164 (2015)

    Google Scholar 

  25. Zhang, T., Chiang, M.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016). https://doi.org/10.1109/JIOT.2016.2584538

  26. Tian, R., Liang, Y., Tan, X., Li, T.: Overlap** user grou** in IoT oriented massive MIMO systems. IEEE Access 5, 14177–14186 (2017)

    Article  Google Scholar 

  27. Aqeel-ur-Rehman, S.U.R., Khan, I.U., Moiz, M., Hasan, S.: Security and privacy issues in IoT. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 8(3), 147–157 (2016)

    Google Scholar 

  28. Ahmed, H., Nasr, A., Abdel-Mageid, S., Aslan, H.: A survey of IoT security threats and defenses. Int. J. Adv. Comput. Res. 9(45), 325–350 (2019)

    Article  Google Scholar 

  29. **g, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014). https://doi.org/10.1007/s11276-014-0761-7

  30. Siddiqui, A.S.: Design of secure boot process for reconfigurable architectures (2020)

    Google Scholar 

  31. Malhotra: Presents a brief overview of the technology, with a focus on various attacks and anomalies, as well as their detection using an intelligent intrusion detection system (IDS) (2021)

    Google Scholar 

  32. Lepakshi, N., Kumar, B., Reddy, A.: Cross layer design in IOT (Internet of Things): issues and challenges. Department of Systems and Computer Engineering, Carleton University (2023)

    Google Scholar 

  33. Narula-Tam, A., Macdonald, T., Modiano, E., Servi, L.: A dynamic resource allocation strategy for satellite communications. In: IEEE MILCOM 2004. Military Communications Conference, vol. 3, pp. 1415–1421 (2004)

    Google Scholar 

  34. Khatoon, S., Javaid, N.: Blockchain based decentralized scalable identity and access management system for Internet of Things (2019)

    Google Scholar 

  35. Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., Chen, H.: Uninvited connections: a study of vulnerable devices on the Internet of Things (IoT), pp. 232–235 (2014). https://doi.org/10.1109/JISIC.2014.43

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Enoch Success Boakai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boakai, E.S., Vaghela, R.S. (2024). Mitigation and Prevention Methods for Cross-Layer Attacks in IoT (Internet of Things) Devices. In: Rajagopal, S., Popat, K., Meva, D., Bajeja, S. (eds) Advancements in Smart Computing and Information Security. ASCIS 2023. Communications in Computer and Information Science, vol 2039. Springer, Cham. https://doi.org/10.1007/978-3-031-59100-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-59100-6_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-59099-3

  • Online ISBN: 978-3-031-59100-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation