2020
DOI: 10.48550/arxiv.2008.09339
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

IoT Network Security: Requirements, Threats, and Countermeasures

Ayyoob Hamza,
Hassan Habibi Gharakheili,
Vijay Sivaraman

Abstract: IoT devices are increasingly utilized in critical infrastructure, enterprises, and households. There are several sophisticated cyberattacks that have been reported and many networks have proven vulnerable to both active and passive attacks by leaking private information, allowing unauthorized access, and being open to denial of service attacks.This paper aims firstly, to assist network operators to understand the need for an IoT network security solution, and then secondly, to survey IoT network attack vectors… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 61 publications
0
9
0
Order By: Relevance
“…Based on the analysis of practice, it can be seen that in the past hospital management practice, an important reason for the frequent occurrence of network security problems is that the hospital ignores the importance of network security in the process of using information systems; so, many work arrangements exist. There are omissions in cybersecurity [11][12][13]. Based on this, it is necessary to change cognition and pay attention to network security.…”
Section: Change the Concept And Pay Attention To Network Security Issuesmentioning
confidence: 99%
“…Based on the analysis of practice, it can be seen that in the past hospital management practice, an important reason for the frequent occurrence of network security problems is that the hospital ignores the importance of network security in the process of using information systems; so, many work arrangements exist. There are omissions in cybersecurity [11][12][13]. Based on this, it is necessary to change cognition and pay attention to network security.…”
Section: Change the Concept And Pay Attention To Network Security Issuesmentioning
confidence: 99%
“…In another type of battery draining attack, the hostile node sends only as many queries to the victim node as are required to keep the target node awake and drain its battery. In this attack, however, the energy consumption of the victim device is not increased significantly in order to keep the attack stealthy [64].…”
Section: ) Battery Draining Attacksmentioning
confidence: 99%
“…Spoofing occurs when an attacker succeeds to pretend itself as a legitimate source and gains control over a data stream, such as GPS and network time protocol (NTP) [64]. This attack is carried out by disguising the attacker's identity and pretending as a trusted source instead.…”
Section: ) Spoofingmentioning
confidence: 99%
“…• (R2) Distributed: it MUST adopt a distributed architecture based on a hybrid cloud/edge deployment. • (R3) Flexibility: it MUST support parameterized evaluation according to the target system, with flexible scheduling policies (e.g., repeated, one shot) [11]. • (R4) 5G-readiness: it MUST support the interaction with devices over mobile networks, in particular 5G, which is one of the IoT-enabling technologies [12].…”
Section: B Requirementsmentioning
confidence: 99%