Internet of Things Security: A Survey on Common Attacks
Dalton Cézane Gomes Valadares, Luiz Antonio Pereira Silva, Daniel Hindemburg de Miranda Marques, Álvaro Alvares de Carvalho César Sobrinho, Andson Marreiros Balieiro + 3 more
TLDR
This paper surveys 28 common IoT attacks, classifying them with STRIDE/CVSS and mapping them to vulnerabilities, offering mitigation insights.
Key contributions
- Surveys 28 common IoT attacks, from traditional (MitM) to specialized (node replication) exploits.
- Classifies threats using the STRIDE model and assesses criticality with the CVSS framework.
- Maps threats to five foundational vulnerability classes: Process, Code, Communication, Operation, Device.
- Presents state-of-the-art mitigation techniques and identifies future research gaps for secure IoT.
Why it matters
IoT security is paramount due to device limitations and an expanding attack surface. This survey provides a structured understanding of threats, vulnerabilities, and mitigations. It acts as a roadmap for researchers and practitioners to build resilient IoT ecosystems.
Original Abstract
The exponential growth of the Internet of Things (IoT) has integrated connected devices into various sectors like smart cities, digital health, and Industry 4.0, generating vast amounts of real-time data to support intelligent decision-making. However, this widespread adoption is fundamentally challenged by significant security risks, primarily due to the inherent computational limitations of devices, lack of standardization, and an expanding attack surface. Given that security is paramount to ensuring trust in these environments, this paper presents a comprehensive survey and a multi-dimensional analysis of the IoT threat landscape. It describes 28 common attacks, ranging from traditional threats, such as Man-in-the-Middle, to specialized IoT exploits, including node replication and skimming. To provide a structured understanding of these risks, we employ the STRIDE model for functional threat classification alongside the CVSS framework for quantitative criticality assessment. Furthermore, the research establishes a robust mapping between these threats and five foundational vulnerability classes (Process, Code, Communication, Operation, and Device), uncovering the specific technical entry points exploited by adversaries. Beyond threat identification, the survey presents state-of-the-art mitigation techniques and discusses emerging paradigms and research gaps, working as a roadmap for future investigation and providing a consolidated technical foundation for both researchers and practitioners aiming to build resilient and secure IoT ecosystems.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.