EconPapers    
Economics at your fingertips  
 

IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids

Pooja Anand, Yashwant Singh, Arvind Selwal, Pradeep Kumar Singh, Raluca Andreea Felseghi and Maria Simona Raboaca
Additional contact information
Pooja Anand: Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, Pin 181143, India
Yashwant Singh: Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, Pin 181143, India
Arvind Selwal: Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, Pin 181143, India
Pradeep Kumar Singh: ABES Engineering College, Ghaziabad, Uttar Pradesh, Pin 201009, India
Raluca Andreea Felseghi: Faculty of Electrical Engineering and Computer Science, “Ştefancel Mare” University of Suceava, 720229 Suceava, Romania
Maria Simona Raboaca: National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm. Valcea, Uzinei Street, No. 4, P.O. Box 7 Raureni, 240050 Valcea, Romania

Energies, 2020, vol. 13, issue 18, 1-23

Abstract: In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common IoT devices and proposes a threat architecture for IoT, addressing threats in the context of a three-layer IoT reference architecture. Furthermore, the vulnerabilities exploited at the several IoT attack surfaces and the challenges they exert are explored. Thereafter, the challenges in quantifying the IoT vulnerabilities with the existing framework are also analyzed. The study also covers a case study on the Intelligent Transportation System, covering road transport and traffic control specifically in terms of threats and vulnerabilities. Another case study on secure energy management in the Smart Grid is also presented. This case study covers the applications of Internet of Vulnerable Things (IoVT) in Smart energy Grid solutions, as there will be tremendous use of IoT in future Smart Grids to save energy and improve overall distribution. The analysis shows that the integration of the proposed architecture in existing applications alarms the developers about the embedded threats in the system.

Keywords: IoT; threats; vulnerabilities; architecture; attack surfaces; smart grid (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)

Downloads: (external link)
https://www.mdpi.com/1996-1073/13/18/4813/pdf (application/pdf)
https://www.mdpi.com/1996-1073/13/18/4813/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:13:y:2020:i:18:p:4813-:d:413616

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jeners:v:13:y:2020:i:18:p:4813-:d:413616