Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
… review of security attacks towards WSNs and IoT, along with the techniques for prevention,
detection, and mitigation of those attacks are provided in this paper. In this text, attacks are …

Security attacks in internet of things: A review

V Mohindru, A Garg - Recent Innovations in Computing: Proceedings of …, 2021 - Springer
… Physical attack: Physical attacks are the attacks that cause physical damage to the device or
… Logical Attack: Logical attacks are the attacks that might launch some kind of attack which …

Internet of Things (IoT): Taxonomy of security attacks

M Nawir, A Amir, N Yaakob… - 2016 3rd international …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises a complex network of smart devices, which frequently
exchange data through the Internet. Given the significant growth of IoT as a new …

Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks

M Abomhara, GM Køien - Journal of Cyber Security …, 2015 - journals.riverpublishers.com
… Examples include attacks on home automation systems and … Among other things, cyber-attacks
could be launched … caused if any connected devices were attacked or corrupted. It is well-…

Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
… DDoS and DoS attacks differ in the attack surface used to launch the attack. In a DDoS attack,
multiple systems are used to launch the attack. These systems might be desktops, servers, …

An impact review on internet of things attacks

AM Gamundani - … conference on emerging trends in networks …, 2015 - ieeexplore.ieee.org
… of objects or “things” that can connect to … internet’s security and reliable operation. The focus
of this paper was to review the impact of some of the attacks attributable to internet of things. …

Threat implications of the internet of things

MJ Covington, R Carskadden - 2013 5th international …, 2013 - ieeexplore.ieee.org
… Using Boyd’s OODA loop construct as a reference for general decision cycles, we can
determine several different forms of manipulate attack within the context of the Internet of Things […

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
… Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks
of creating a smart city through Internet of Things,” IEEE Internet Things J., vol. 1, no. 2, pp. …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
… phishing and Botnet attack detection and … attacks; and (2) a cloud-based temporal Long-Short
Term Memory (LSTM) network model hosted on the back-end for detecting Botnet attacks, …

Security threats, attacks, and possible countermeasures in internet of things

ST Siddiqui, S Alam, R Ahmad, M Shuaib - Advances in Data and …, 2020 - Springer
… of attacks. One of the greatest concerns of IoT is to provide security assurance for the data
exchange because data is vulnerable to a number of attacks by … layers, potential attacks, and …