2023
DOI: 10.1016/j.comnet.2023.110015
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks in Industrial IoT: A survey

Shubhankar Chaudhary,
Pramod Kumar Mishra
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 96 publications
0
3
0
Order By: Relevance
“…The potential applications of IoT encompass a wide and diverse range of fields, and its impact is manifested in various industries, such as tourism [6], home healthcare [7], agriculture [8,9], and finance [10], among others. As the number of devices connected to the global network continues to grow, it has raised new concerns regarding security, stemming from the vulnerabilities presented by IoT devices, such as authentication, access control, device security, and heterogeneity, among others [2,[11][12][13]. These vulnerabilities require defense strategies against potential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The potential applications of IoT encompass a wide and diverse range of fields, and its impact is manifested in various industries, such as tourism [6], home healthcare [7], agriculture [8,9], and finance [10], among others. As the number of devices connected to the global network continues to grow, it has raised new concerns regarding security, stemming from the vulnerabilities presented by IoT devices, such as authentication, access control, device security, and heterogeneity, among others [2,[11][12][13]. These vulnerabilities require defense strategies against potential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, IoT security issues likewise hinger the adoption of the IIoT. Since IoT devices are usually poorly secured, they are easy targets for malware to utilize in destructive cyberattacks, such as distributed denial of service (DDoS) [13,14] or sabotage attacks. Indeed, traditional industrial environments have been attacked in the past, sometimes with devastating consequences.…”
Section: Introductionmentioning
confidence: 99%
“…Also, fuzzy-based approaches can be widely used in WSN to address various issues such as security, data fusion, and routing, and now current research interest tends toward clustering. Sensor nodes are primary in all emerging fields, whether IoT [25][26][27][28][29] digital image processing, cloud computing, 30 or artificial intelligence. Everywhere we need a sensor node to sense the data or surrounding and send the data to the server.…”
mentioning
confidence: 99%