Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Cyber Attack in Internet of Things

Dr. S. Banumathi, R. Abisha

Abstract


The Internet of Things (IoT) describes a world where just about anything is an Internet enabled device. IoT is comprised of smart physical objects such as vehicles and buildings or embedded devices such as refrigerators, toasters and routers. These devices feature sensors and an IP address for Internet connectivity, enabling these objects to collect and exchange data while allowing users the ability to automate or control their devices .As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no surprise that many cyber-attacks in IoT. The attacker initially exploits some vulnerable IoT technology as a first step towards compromising a critical system that is connected, in some way, with the IoT.

Keywords


IoT, Cyber Attack, Cybercrime, Botnet, DDoS.

Full Text:

PDF

References


Paloalto, “Impact of cyberattacks on IoT devices” Article in PDF, Oct, 2019.

DanielDiazLopez, Maria, BlancoUribe, ClaudiaSantiagoCely, Andresvegatorres,NicolasGuataqu ira,StefanyMoronCastro, Pantaleone Nespoli, and Felix Gomez Marmol , “Shielding IoT against cyber attack:an event based approach using SIEM”, Research article, oct 25,2018,pp:18.

Leatoms,“Five common cyber attack in IoT-Threat alert on a grand scale common” Article in PDF,April,2016.

IoannisStellios,MihalisPsarakis,M.Aicaraz,lopez,j,“A Survey of IoT-enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services”, Article in IEEE,july,2018, PP(99):1-1.

Roland Atoui,“ IoT Botnets and DDoS Attacks: Architecting Against Disaster”, Article in IEEE,Sep,2019.

Radware, “A Quick History of IoT Botnets”, Article in PDF, March, 2018.

NeilDuPaul,“man-middle-attack”, https://www.veracode.com/security.

Nate lord, “Social engineering attacks: common techniques & how to prevent an attack”, https://digitalguardian.com.

Leatoms, “Data and identity theft in the IoT” Airtical in PDF, March, 2016.

JaSamuel, Macarthyosuogenseleke, Chiomachigozieokwum, “Cyber-attack: A literature survey”, Article in PDF, july, 2019.

Ian G.harris,”Social Engineering Attack on the Internet of Things”, Article in IEEE, September 7, 2016.

https://www.iotone.com/term/denial-of-service-attack-dos/t174.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.