1,178 Hits in 5.9 sec


S Suganth, D Usha
2018 International Journal of Advanced Research  
This paper gives a complete survey about the taxonomy, summarized and organized recent research results of Intrusion detection system in IoT.  ...  Now in this era of science and technology, the computer may take a vital role to store and disseminate knowledge to the public.  ...  Al [15] present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques.  ... 
doi:10.21474/ijar01/7183 fatcat:kfpqlishzrhp5newitoppf7jeu

A survey of IoT security threats and defenses

Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid, Heba K. Aslan
2019 International Journal of Advanced Computer Research  
Keywords Internet of things (IoT), Radio frequency identification (RFID), Big data analytics, Distributed denial of services (DDoS). Hassan I.  ...  In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems.  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijacr.2019.940088 fatcat:wt3yxyezpvd2vcoictluggdei4

Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis, Charalabos Skianis
2021 IoT  
In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities  ...  In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent  ...  Denial of Service (DoS) or Distributed Denial of Service (DDoS).  ... 
doi:10.3390/iot2010009 fatcat:qf2won2u5zes3gag264k3l7pjq

Reinforcement Learning for IoT Security: A Comprehensive Survey

Aashma Uprety, Danda B. Rawat
2020 IEEE Internet of Things Journal  
In this paper, we present an comprehensive survey of different types of cyber-attacks against different IoT systems and then we present reinforcement learning and deep reinforcement learning based security  ...  Security has been a long run challenge in the IoT systems which has many attack vectors, security flaws and vulnerabilities.  ...  Denial of Service Attack IoT systems face cyber-attack like Denial of Service (DoS) attack resulting in selective forwarding and eavesdropping [46] .  ... 
doi:10.1109/jiot.2020.3040957 fatcat:qtm2emhqmjhlncyczuij6nw3oa

Towards Privacy Preserving IoT Environments: A Survey

Mohamed Seliem, Khalid Elgazzar, Kasem Khalil
2018 Wireless Communications and Mobile Computing  
IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life.  ...  As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption.  ...  Wireless Communications and Mobile Computing Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1032761 fatcat:j76yhuc5rjhvbifkk5foq3klzq

A Survey of IoT and Blockchain Integration: Security Perspective

Elham A. Shammar, Ammar T. Zahary, Asma A. Al-Shargabi
2021 IEEE Access  
It provides a literature review of IoT and blockchain integration by examining current research issues and trends in the applications of blockchain-related approaches and technologies within the IoT security  ...  In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment.  ...  A recent example of a distributed denial of service (DDoS) attack, which took down DNS services in Europe and North America, was the attack against DNS provider Dyn in October 2016 using a botnet of Linux-based  ... 
doi:10.1109/access.2021.3129697 fatcat:l3tj4zelejbobouc2ouw3j3pcy

Blockchain and IoT Integration: A Systematic Survey

Alfonso Panarello, Nachiket Tapas, Giovanni Merlino, Francesco Longo, Antonio Puliafito
2018 Sensors  
This article presents a comprehensive survey on BC and IoT integration.  ...  Last but not least, we also present a survey about novel uses of BC in the machine economy.  ...  Typically, in an IoT network, each node is a possible point of failure that can be exploited to launch cyber attacks such as Distributed Denial-of-Service (DDoS) [15] .  ... 
doi:10.3390/s18082575 pmid:30082633 fatcat:ugnnd2unqnbm5mejatahog3lzm

Machine learning based solutions for security of Internet of Things (IoT): A survey

Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos
2020 Journal of Network and Computer Applications  
In this survey paper, the architecture of IoT is discussed, following a comprehensive literature review on ML approaches the importance of security of IoT in terms of different types of possible attacks  ...  Over the last decade, IoT platforms have been developed into a global giant that grabs every aspect of our daily lives by advancing human life with its unaccountable smart services.  ...  (i) Denial of Service Attacks Denial of Service (DoS) attacks are mainly responsible for disrupting the services of system by creating several redundant requests (see Fig. 5 ).  ... 
doi:10.1016/j.jnca.2020.102630 fatcat:r6krcsvevrc67itbypxrgxryeq

A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model

Hezam Akram, Dimitri Konstantas, Mohammed Mahyoub
2018 International Journal of Advanced Computer Science and Applications  
A generic understanding of IoT is that it offers numerous services in many domains, utilizing conventional internet infrastructure by enabling different communication patterns such as human-to-object,  ...  Finally, we show the relationship between each attack and its violated security goals, and identify a set of countermeasures to protect each asset as well.  ...  Distributed Denial of Service (DDoS): One of the main techniques that can be used to establish DDOS attack is a botnet.  ... 
doi:10.14569/ijacsa.2018.090349 fatcat:swdbzypft5bwbo6pkzaucteduq

Exploiting JTAG and Its Mitigation in IOT: A Survey

Gopal Vishwakarma, Wonjun Lee
2018 Future Internet  
This JTAG interface can be used as a backdoor entry to access and exploit devices, also defined as a physical attack.  ...  This paper reviews previous successful JTAG exploitations of well-known devices operating online and also reviews some proposed possible solutions to see how they can affect IoT products in a broader sense  ...  The Mirai malware attacked website of "Krebbs; a software security consultant company", with 620 Gbps of traffic in September 2016, which was one of the huge DDoS attacks (Distributed denial-of-service  ... 
doi:10.3390/fi10120121 fatcat:amsmnrbwvfe4pi3w3xjaidvmqm

Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey

Zhanyang Xu, Wentao Liu, Jingwang Huang, Chenyi Yang, Jiawei Lu, Haozhe Tan
2020 Security and Communication Networks  
In this paper, a comprehensive survey of the contribution of AI to the IoT security in EC is presented. First, the research status and some basic definitions are introduced.  ...  Next, the IoT service framework with EC is discussed. The survey of privacy preservation and blockchain for edge-enabled IoT services with AI is then presented.  ...  of service (DoS) attack and distributed denial of service (DDoS) attack.  ... 
doi:10.1155/2020/8872586 fatcat:wliclkyxufchpfrdw24fckwktq

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey [article]

Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim
2020 arXiv   pre-print
Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT.  ...  All these devices can be grouped under a common term of M-IoT.  ...  -Defense against a Resource Exhaustion Attack: This type of attack should be prevented as resource exhaustion attacks can exploit the network and the M-IoT devices through excessive key operations.  ... 
arXiv:1903.05362v3 fatcat:wjp44eatfrgg5gevkbo7oqwatq

A Survey on Securing IoT Ecosystems and Adaptive Network Vision

Tejaswini Goli, Yoohwan Kim
2021 International Journal of Networked and Distributed Computing (IJNDC)  
Distributed Denial-of-Service (DDoS) attack are the most common attack that targets Availability of service and network.  ...  Shape security tool is a good example as a defensive mechanism tool for Bot attacks. • Another example where we can apply Adaptive security strategies in IoT is if a IoT device is compromised and security  ...  Figure 12 | Honeypot design used in conjunction with ML framework and remediation framework.  ... 
doi:10.2991/ijndc.k.210617.001 fatcat:v65pclkzfjbjnjxl56kfwqas64

A Survey on the Applications of Blockchains in Security of IoT Systems [article]

Zulfiqar Ali Khan, Akbar Siami Namin
2021 arXiv   pre-print
The innovation of this survey is that we present a survey based upon the integration approaches and security issues of IoT data and discuss the role of Blockchain in connection with these issues.  ...  This survey paper reviews the adaptation of Blockchain in the context of IoT to represent how this technology is capable of addressing the integration and security problems of devices connected to IoT  ...  Finally, all the bots waiting in the pool launch a massive DDoS (distributed denial of Service) attack, which blocks the networking channels, making it impossible to connect.  ... 
arXiv:2112.09296v1 fatcat:bempf3xzrjb7hc5zngmliyqgbe

Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

Edward Staddon, Valeria Loscri, Nathalie Mitton
2021 Applied Sciences  
This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical  ...  It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.  ...  In [7] , it is mentioned that cyber attacks is a grouping of multiple stages, such as the notion of reconnaissance or Denial-of-Service.  ... 
doi:10.3390/app11167228 fatcat:otk56tjrqrd7ffcpcajea62atq
« Previous Showing results 1 — 15 out of 1,178 results