Authors :
Dr. Li Jie; Samuel Boateng
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/7vfre3ma
Scribd :
https://tinyurl.com/29edzpnv
DOI :
https://doi.org/10.38124/ijisrt/25mar1755
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
The swift growth of IoT devices in smart cities and connected homes has transformed our lifestyle and interaction with
our surroundings. Nevertheless, this remarkable expansion has also resulted in notable security difficulties that must be
dealt with. This project seeks to explore the security weaknesses and dangers linked to the IoT environment in the UK, with
a specific focus on smart cities and connected homes.
The study will utilize the Cooja network simulator and the Contiki operating system for experimentation. Cooja offers
a versatile and expandable platform for simulating extensive IoT networks, allowing for the replication of various IoT
devices and their communication. Contiki OS, created for IoT devices with limited resources, will be utilized to create and
implement IoT applications in a simulated environment.
The plan involves the use of VirtualBox, a robust virtualisation software, to operate within a virtual machine setting.
VirtualBox will make it easier for the Cooja simulator and the Contiki OS to work together smoothly, allowing for a
controlled and isolated setting for experiments and analysis. The effectiveness of current security measures is assessed by
mimicking real-world IoT setups, and new strategies for detecting and stopping blackhole attacks are put forward in the
study.
The study is striving to uncover weaknesses in existing IoT security methods and create successful defences against
blackhole attacks by conducting thorough simulations and empirical analysis. The results of this study will have important
consequences for improving the security and strength of IoT environments, which will help protect vital infrastructure,
ensure user confidentiality, and build trust in the use of smart city and connected home technologies in the UK.
The outcomes of this study will help enhance comprehension of IoT security issues and offer important perspectives
for various stakeholders, such as policy makers, industry experts, and researchers, in creating strong and secure IoT systems
for smart cities and connected homes in the UK.
References :
- Alaba, F.A. et al. (2017) 'Internet of Things security: A survey', Journal of Network and Computer Applications, 88, pp.10-28.
- Albreem, M.A. et al. (2021) 'Green Internet of Things (GIoT): Applications, practices, awareness, and challenges', IEEE Access, 9, pp.38833-38858.
- Al-Fuqaha, A. et al. (2015) 'Internet of Things: A survey on enabling technologies, protocols, and applications', IEEE Communications Surveys & Tutorials, 17(4), pp.2347-2376.
- Basir, N.et al. (2019) 'A systematic literature review of online vulnerability disclosure practices in the Internet of Things', Journal of Cyber Security Technology, 3(3), pp.143-161.
- Bauer, H. et al. (2013) 'Lifecycle management for secure Internet of Things', Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp.786-793.
- Blythe, J.M., Johnson, S.D. and Manning, M. (2020) 'What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices', Crime Science, 9(1), pp.1-9.
- Boreli, R., et al. (2015) 'Network-level security and privacy control for smart-home IoT devices', Proceedings of the 11th IEEE International Symposium on Intelligent Systems.
- Brown, A. (2021) 'IoT Security: Challenges and Solutions', International Journal of Advanced Computer Science and Applications, 12(3), pp.1-9.
- Caron, X. et al. (2016) 'The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective', Computer Law & Security Review, 32(1), pp.4-15.
- Carsten et al. (2011) 'Contiki: The Open Source OS for the Internet of Things', IEEE Communications Magazine.
- Cavilla, H.A.L. (2009) Flexible Computing with Virtual Machines. University of Toronto (Canada).
- Cervantes, C. et al. (2015) 'Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things', 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.606-611. https://doi.org/10.1109/INM.2015.7140350
- Cirne, A. et al. (2022) 'IoT security certifications: Challenges and potential approaches', Computers & Security, 116, pp.102669.
- Deng, H., Li, W. and Agrawal, D.P. (2002) 'Routing security in wireless ad hoc networks', IEEE Communications Magazine, 40(10), pp.70-75. https://doi.org/10.1109/MCOM.2002.1039859
- Desai, P., Sheth, A. and Anantharam, P. (2015) 'Semantic gateway as a service architecture for iot interoperability', Proceedings of the 2015 IEEE international conference on mobile services, pp.313-319.
- Dunkels, A. et al. (2007) 'Run-Time Dynamic Linking for Reprogramming Wireless Sensor Networks', Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pp.15–28. doi: 10.1145/1322263.1322266.
- Dunkels, A., Gronvall, B. and Voigt, T. (2004) 'Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors', Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp.455–462. doi: 10.1109/LCN.2004.38.
- Dunkels, A., Gronvall, B. and Voigt, T. (2004) 'Contiki - A Lightweight and Flexible Operating System for Tiny Networked Sensors', Conference on Local Computer Networks.
- Dunkels, A., Österlind, F. and He, Z. (2007) 'An adaptive communication-aware motion detection algorithm for wireless sensor networks', Proceedings of the 5th international conference on Embedded networked sensor systems - SenSys '07. doi: 10.1145/1322263.1322280.
- Farooq, M.U. et al. (2015) 'A critical analysis on the security concerns of internet of things (IoT)', International Journal of Computer Applications, 111(7), pp.1-6.
- Ge, M. et al. (2017) 'A framework for automating security analysis of the internet of things', Proceedings of the Third ACM Workshop on Internet of Things Security and Privacy, pp.39-53.
- Gubbi, J. et al. (2013) 'Internet of Things (IoT): A vision, architectural elements, and future directions', Future Generation Computer Systems, 29(7), pp.1645-1660.
- Johnson, R. (2019) 'Security and Privacy Issues in IoT Environments', Security and Communication Networks, 2019, pp.1-8.
- Jones and associates (2020) 'Security Flaws in Smart Parking Systems: Manchester Teaches Us', Proceedings of The International Conference on Cybersecurity (ICC), 2020.
- Jones, B. and Johnson, T. (2019) 'Internet of Things Security: Vulnerabilities, Challenges, and Solutions', International Journal of Computer Networks and Applications, 6(1), pp.15-25.
- Jones, B. and Johnson, T. (2023) 'Internet of Things Security: Vulnerabilities, Challenges, and Solutions', International Journal of Computer Networks and Applications, 6(1), pp.15-25.
- Jones, F., Shah, P. and Thomas, M. (2020) 'Security Vulnerabilities in Consumer IoT Devices', Journal of Cybersecurity, 6(2), pp.123-140.
- Laukkarinen et al. (2017) 'Evaluating IoT Operating Systems for Resource Constrained Environments', Conference on Open Systems.
- Lee, I. and Lee, K. (2015) 'The Internet of Things (IoT): Applications, investments, and challenges for enterprises', Business Horizons, 58(4), pp.431-440.
- Lee, J. and Ahn, J. (2019) 'Security Threats and Issues in the Internet of Things for Smart Cities and Homes', Journal of Information Security, 23(2), pp.220-234.
- Lee, J. (2022) 'Challenges in Securing Large-Scale IoT Ecosystems', Computing and Network Security, 29(5), pp.15-21.
- Lom, M., Pribyl, O. and Svitek, M. (2016) 'Industry 4.0 as a part of smart cities', Proceedings of the 2016 Smart Cities Symposium Prague (SCSP), pp.1-6.
- Mahmood, K. et al (2019) 'A survey on machine learning algorithms for Internet of Things: Applications and challenges', Proceedings of the 2019 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp.1-6.
- Majumder, S. et al. (2017) 'Smart homes for elderly healthcare-Recent advances and research challenges', Sensors, 17(11), p.2496.
- Maple, C. (2017) 'Security and privacy in the internet of things', Journal of Cyber Policy, 2(2), pp.155-184.
- Mouradian, A. et al. (2014) 'A comprehensive survey on fog computing: State-of-the-art and research challenges', IEEE Communications Surveys & Tutorials, 17(1), pp.98-149.
- Obaidat, M.A. et al. (2020) 'A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures', Computers, 9(2), p.44.
- Orthacker, Cet al. (2017) 'Secure and practical communications from embedded IoT devices to cloud-based services', Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp.281-289.
- Österlind, F. et al. (2006) 'Cross-Level Sensor Network Simulation with COOJA', Proceedings of the 31st IEEE Conference on Local Computer Networks, pp.641–648. doi: 10.1109/LCN.2006.322172.
- Osterlind, F. et al. (2006) 'Cross-level sensor network simulation with cooja', Proceedings of the 31st IEEE conference on local computer networks, pp.641-648.
- Pearce, M., Zeadally, S. and Hunt, R. (2013) 'Virtualization: Issues, security threats, and solutions', ACM Computing Surveys (CSUR), 45(2), pp.1-39.
- Perera, C. et al. (2014) 'A survey on internet of things from industrial market perspective', IEEE Access, 2, pp.1660-1679.
- Pirbhulal, S. et al. (2017) 'A novel secure IoT-based smart home automation system using a wireless sensor network', Sensors, 17(1), p.69. doi: 10.3390/s17010069.
- Raza, S., Wallgren, L. and Voigt, T. (2013) 'SVELTE: Real-time intrusion detection in the Internet of Things', Ad hoc networks, 11(8), pp.2661-2674.
- Roman, R., Zhou, J. and Lopez, J. (2013) 'On the features and challenges of security and privacy in distributed internet of things', Computer Networks, 57(10), pp.2266-2279. doi: 10.1016/j.comnet.2012.12.018.
- Riahi, A. et al. (2013) 'A systemic and cognitive approach for IoT security', Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC), pp.183-188.
- Schneier, B. (2017) 'Security and survival in a hyperconnected world: Click here to kill everybody', W.W. Norton & Company, New York.
- Shah, G.A., Gungor, V.C. and Akan, O.B. (2013) 'A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications', IEEE Transactions on Industrial Informatics, 9(3), pp.1477-1485.
- Sharma, D.K. et al. (2022) 'Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems',. Elsevier BV.
- Sicari, S. et al. (2015) 'Security, privacy and trust in Internet of Things: The road ahead', Computer Networks, 76, pp.146-164.
- Sisinni, E. et al. (2018) 'Industrial internet of things: Challenges, opportunities, and directions', IEEE Transactions on Industrial Informatics, 14(11), pp.4724-4734.
- Smith, A. (2018) 'Assessing IoT Security Risks in Public Wi-Fi Networks: A Case Study of London', Journal of Cybersecurity, 3(1), pp.45-56.
- Smith, A. (2020) 'Security Challenges in the Expanding Internet of Things Ecosystem', Journal of Cybersecurity, 6(4), pp.213-226.
- Smith, A. (2021) 'The Increasing Cyber Risks in an IoT World', Information Security Review, 17(8), pp.13-19.
- Smith, J. and Patel, M. (2019) 'Addressing Resource Constraints in IoT Security: Challenges for UK SMEs', Proceedings of the European Conference on Cybersecurity (ECC), 2019.
- Stadler, M. and Del Giorgio, P.A. (2022) 'Terrestrial connectivity, upstream aquatic history and seasonality shape bacterial community assembly within a large boreal aquatic network', The ISME Journal, 16(4), pp.937-947.
- Suo, H. et al. (2012) 'Security in the internet of things: a review', Proceedings of the 2012 international conference on computer science and electronics engineering, 3, pp.648-651. doi: 10.1109/ICCSEE.2012.373.
- Suo, H. et al. (2012) 'Security in the internet of things: A review', Proceedings of the 2012 International Conference on Computer Science.
- Sivaraman, V. et al. (2015) 'Network-level security and privacy control for smart-home IoT devices', Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.163-167.
- Taylor, L. (2021) 'Physical Security Vulnerabilities in IoT Devices', Journal of Information Security Research, 5(1), pp.23-35.
- Vermesan, O. and Friess, P. (2013) 'Internet of Things: Converging technologies for smart environments and integrated ecosystems'. River Publishers.
- Wallgren, L., Raza, S. and Voigt, T. (2013) 'Routing Attacks and Countermeasures in the RPL-Based Internet of Things', International Journal of Distributed Sensor Networks, 9(8), p.794326. https://doi.org/10.1155/2013/794326
- White, M. and Williams, S. (2020) 'Encryption Practices and Challenges in IoT Communications', IEEE Transactions on Dependable and Secure Computing, 17(4), pp.726-739.
- Wolfert, S. et al. (2017) 'Big data in smart farming–a review', Agricultural Systems, 153, pp.69-80.
- Wortmann, F. and Flüchter, K. (2015) 'Internet of things: technology and value added', Business & information systems engineering, 57, pp.221-224.
- Xu, L.D., He, W. and Li, S. (2014) 'Internet of Things in industries: A survey', IEEE Transactions on Industrial Informatics, 10(4), pp.2233-2243.
- Zanella, A. et al. (2014) 'Internet of Things for smart cities', IEEE Internet of Things Journal, 1(1), pp.22-32.
- Zarpelão, B.B. et al. (2017) 'A survey of intrusion detection in Internet of Things', Journal of Network and Computer Applications, 84, pp.25-37.
- Zhu, Q. et al. (2010) 'IoT gateway: Bridgingwireless sensor networks into internet of things', Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.347-352. doi: 10.1109/EUC.2010.58.
The swift growth of IoT devices in smart cities and connected homes has transformed our lifestyle and interaction with
our surroundings. Nevertheless, this remarkable expansion has also resulted in notable security difficulties that must be
dealt with. This project seeks to explore the security weaknesses and dangers linked to the IoT environment in the UK, with
a specific focus on smart cities and connected homes.
The study will utilize the Cooja network simulator and the Contiki operating system for experimentation. Cooja offers
a versatile and expandable platform for simulating extensive IoT networks, allowing for the replication of various IoT
devices and their communication. Contiki OS, created for IoT devices with limited resources, will be utilized to create and
implement IoT applications in a simulated environment.
The plan involves the use of VirtualBox, a robust virtualisation software, to operate within a virtual machine setting.
VirtualBox will make it easier for the Cooja simulator and the Contiki OS to work together smoothly, allowing for a
controlled and isolated setting for experiments and analysis. The effectiveness of current security measures is assessed by
mimicking real-world IoT setups, and new strategies for detecting and stopping blackhole attacks are put forward in the
study.
The study is striving to uncover weaknesses in existing IoT security methods and create successful defences against
blackhole attacks by conducting thorough simulations and empirical analysis. The results of this study will have important
consequences for improving the security and strength of IoT environments, which will help protect vital infrastructure,
ensure user confidentiality, and build trust in the use of smart city and connected home technologies in the UK.
The outcomes of this study will help enhance comprehension of IoT security issues and offer important perspectives
for various stakeholders, such as policy makers, industry experts, and researchers, in creating strong and secure IoT systems
for smart cities and connected homes in the UK.