7 CONCLUSIONS
Though the Internet of things seems to be a revolu-
tionary concept it can’t come to reality without solv-
ing its security issues. The security challenges of IoT
is so vast, and it cannot be solved by current technolo-
gies. Integration of multiple technologies will only
make the system more complex and hence less secure.
We explained various reasons why IoT cannot be se-
cure practically. There are no satisfying solutions for
the security issues of IoT. Even the suggested solu-
tions like lightweight encryption and standardisations
face many criticisms for its efficiency. Hence we con-
clude that IoT can never be secure.
REFERENCES
Ashton, K. (2009). That internet of things thing. RFiD
Journal, 22:97–114.
Barcena, M. B. and Wueest, C. (2015). Insecurity in the
internet of things. Security Response, Symantec.
Burmester, M. and De Medeiros, B. (2007). Rfid security:
attacks, countermeasures and challenges. In The RFID
Journal.
CISCO (2013). Securing the internet
of things: A proposed framework.
http://www.cisco.com/c/en/us/about/security-
center/secure-iot-proposed-framework.html.
Derbez, P. and Fouque, P.-A. (2013). Exhausting demirci-
selc¸uk meet-in-the-middle attacks against reduced-
round aes. In International Workshop on Fast Soft-
ware Encryption, pages 541–560. Springer.
Drozhzhin, A. (2015). Internet of crappy things.
https://kas.pr/at2F.
Farooq, M., Waseem, M., Khairi, A., and Mazhar, S. (2015).
A critical analysis on the security concerns of internet
of things (iot). International Journal of Computer.
Gartner, I. (2014). Gartner says 4.9 billion con-
nected ”things” will be in use in 2015.
http://www.gartner.com/newsroom/id/2905717.
Group, I. W. (2016). Future-proofing the connected world:
13 steps to developing secure iot products.
Hancke, G. et al. (2008). Eavesdropping attacks on high-
frequency rfid tokens. In 4th Workshop on RFID Se-
curity (RFIDSec), pages 100–113.
Hancke, G. P. (2005). A practical relay attack on iso 14443
proximity cards. Technical report, University of Cam-
bridge Computer Laboratory, 59:382–385.
HP (2014). Hpe fortify and the internet of things.
http://go.saas.hpe.com/fod/internet-of-things.
Insider, B. (2016). The master key to understanding the iot
revolution. http://read.bi/29mOi16.
Kibirige, G. W. and Sanga, C. (2015). A survey on detection
of sinkhole attack in wireless sensor network. arXiv
preprint arXiv:1505.01941.
Kurakova, T. (2013). Overview of internet of things. Pro-
ceedings of the Internet of things and its enablers
(INTHITEN), pages 82–94.
Lee, J., Kapitanova, K., and Son, S. H. (2010). The price
of security in wireless sensor networks. In Computer
Networks. Elsevier.
Li, L. (2012). Study on security architecture in the internet
of things. In Measurement, Information and Control
(MIC), 2012 Int. Conference on, volume 1, pages 374–
377. IEEE.
Luhach, A. K. et al. (2016). Analysis of lightweight crypto-
graphic solutions for internet of things. Indian Journal
of Science and Technology, 9.
Messai, M.-L. (2014). Classification of attacks in wireless
sensor networks. arXiv preprint arXiv:1406.4516.
Miller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle. Black Hat USA.
Mitrokotsa, A., Rieback, M. R., and Tanenbaum, A. S.
(2010). Classifying rfid attacks and defenses. Infor-
mation Systems Frontiers, 12(5):491–505.
Ning, H., Liu, H., et al. (2012). Cyber-physical-social based
security architecture for future internet of things. Ad-
vances in Internet of Things.
Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., and
Chen, H. (2014). Uninvited connections: a study of
vulnerable devices on the internet of things (iot). In
JISIC, 2014, pages 232–235. IEEE.
Pirretti, M., Z. S. V. N. M. P. K. M. B. R. (2006). The
sleep deprivation attack in sensor networks: Analysis
and methods of defense. International Journal of Dis-
tributed Sensor Networks, 2.
PubNub (2015). A new approach to iot security.
Rose, K., Eldridge, S., and Chapin, L. (2015). The internet
of things: An overview. The Internet Society (ISOC),
pages 1–50.
Sabanal, P. (2016). Thingbots: The future of botnets in the
internet of things. RSA Conference.
Sathyadevan, S., Achuthan, K., and Poroor, J. (2014). Ar-
chitectural recommendations in building a network
based secure, scalable and interoperable internet of
things middleware. In Advances in Intelligent Sys-
tems and Computing, volume 327, pages 429–439.
Springer.
Sathyadevan, S., Kalarickal, B., and Jinesh, M. K. (2015).
Security, trust and implementation limitations of
prominent iot platforms. In Advances in Intelligent
Systems and Computing, volume 328, pages 85–95.
Springer.
Schulman, J. (2016). Why we will never secure the internet
of things. buildingacareerinsecurity.com.
Spring, T. (2016). Iot insecurity pinpointing the problems.
Storey, A. (2014). There’s nothing smartabout insecure con-
nected devices. Network Security, pages 9–12.
Suo, H., Wan, J., Zou, C., and Liu, J. (2012). Security in
the internet of things: a review. In Computer Science
and Electronics Engineering (ICCSEE), Int. Confer-
ence on, volume 3, pages 648–651. IEEE.
Uttarkar, M. R. and Kulkarni, R. (2014). Internet of things:
Architecture and security. International Journal of
Computer Application, pages 12–19.
Zunnurhain, K. (2016). Vulnerabilities with internet of
things. In Proceedings of the Int. Conference on SAM,
page 83.