Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Table 4

Taxonomy of various attacks and defence mechanism at different layers.

Application layerNetwork layerPerception layerTransport layer
AttackPossible defence mechanismAttackPossible defence mechanismAttackPossible defence mechanismAttackPossible defence mechanism

Common injection attackOpenHab technology
IoTOne technology
Node misbehaviour and service attackReputation basedCipher text attackEncryption based on HashFlooding attackCompressed DTLS header
Attack on privacyPreference-based protectionIdentity theft attackIdentity management frameworkDDoS attackPKI protocolReplay attackCompressed IPsec
Identity spoofing attackSecurity framework based on IdentityFault injection attackRisk-based adaptive frameworkPhishing attackSecure authorization OAuthRouting attackECC DTLS 6LoWPAN
Border router ECC
Side channel attackSDN-enabled IoTSide channel attackLightweight cryptography
No forwarding attackCooperative nodes protocolCrypt-analysis attackFramework based on embedded security
EavesdroppingCluster-based IDS