Security Threats in the IoTDifferent Types of Security Attacks in the Internet of Things1. Cloning ThingsCloning means creating a similar physical and behavioral copy of an existing thing. Cloning objects in the Internet of Things means creating a device that maintains the exact behaviors of the existing device on the market. By cloning things, any maker can create things and include properties of things such as physical configurations or behaviors. In the Internet of Things, devices interact with humans and other devices to share information. If the cloned device is programmed to transmit sensitive user information to untrusted servers, it could cause serious problems for the user. Therefore, when purchasing devices, users should check the device manufacturer for security purposes. Manufacturers must find a way to securely transmit data only to trusted devices using some verification methodologies such as authenticating users to access the web.2. Malicious Thing Substitution Malicious Thing Substitution involves replacing trusted items with untrusted items that may cause information loss. Loss of identity is one of the Internet's biggest problems. A malicious company may produce something that looks and behaves similarly to those made by another trusted company, which could cause customers to lose the trust they have in the company. Malicious things look and behave similarly to the real thing. The user is not aware of the actions taking place on the server side, so if a user finds something wrong with the device they may lose confidence in the actual manufacturing of the device.3. Eaves Dropping Attack Eavesdropping is listening to private conversations or private messages that are not intended for this device. A device can listen to another network of devices communicating with each other. In IoT, devices inside our home interact with each other and communicate with the server. So, if an untrusted device is fixed at home, it will not only listen to the messages intended for it but also all messages. This problem can be reduced by having different routers for communication. Using different ports for internal and external communications reduces the risk of message interception. Manufacturers should have a protocol to protect messages heard by untrusted devices. To protect customers, manufacturers should have a protocol like encryption where messages are encrypted from the sender side and only the legitimate recipient can decrypt them.
tags