2020
DOI: 10.1002/ett.4142
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things backdoors: Resource management issues, security challenges, and detection methods

Abstract: Internet of Things (IoT) technology is one of the successful and interesting products of ubiquitous wireless networks that beneficiate human life with the make use of smart devices. Many companies have a significant plan to develop and utilize the IoT benefits and futures. Context‐aware computing applications are extensively used anywhere and anytime but they may violate or abuse human privacy. For example, if an IoT healthcare resource like a pacemaker acts as a backdoor on a human body, human life will be in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 49 publications
0
23
0
Order By: Relevance
“…In data mining technology, the clustering algorithm can be regarded as a very practical algorithm. From the current point of view, it is a well-deserved cluster analysis that is widely used in most applications, such as image processing, pattern recognition, data processing, and market research [16]. As a large piece of data mining technology clustering algorithm, it divides instances into natural groups and then distinguishes the hidden classes in the data, instead of using predicted instance classes.…”
Section: Clustering Algorithmmentioning
confidence: 99%
“…In data mining technology, the clustering algorithm can be regarded as a very practical algorithm. From the current point of view, it is a well-deserved cluster analysis that is widely used in most applications, such as image processing, pattern recognition, data processing, and market research [16]. As a large piece of data mining technology clustering algorithm, it divides instances into natural groups and then distinguishes the hidden classes in the data, instead of using predicted instance classes.…”
Section: Clustering Algorithmmentioning
confidence: 99%
“…The accelerating use of smart devices, novel communication protocols, and advanced emerging technologies has given rise to the utilization of various IoT services 5 . IoT is comprised of four fundamental layers, including perception layer, communication layer, processing layer, and service layer.…”
Section: Introductionmentioning
confidence: 99%
“…Hashemi and Zarei highlighted the importance of safe securing IoT networks by developing machine learning frameworks in invasion detection. They handled IoT technology backdoors considering entire layers to manage security challenges 5 . The popular intrusions 5‐10 are The DoS/DDoS attack is caused by sending fake packets and fake request storms to service to make it temporarily or permanently unavailable for real packets. Analysis attack is comprised of various intrusions, including port scan, spam, and HTML file penetrations. Backdoor attack is a malware‐type intrusion that utilizes classical authentication to grant the privileges for server hijacking or data theft. Fuzzer attack attempts to lead a software or network suspended by covering unexpected or random data as inputs for crashing, halting, and detecting bugs. Exploit attack is trading on the security bugs of operating systems and software for causing unforeseen behaviors on system or network. Generic attack is freely trying to crack the pass of a block‐cipher without cryptographical primitive by preimaging. Reconnaissance is comprised of whole complete strikes that have the ability to simulate gathering information intrusions. Shellcode is a small code block that exploits software and operating system vulnerabilities for giving control over the system by granting the privileges as root. Worm is a malware that replicates itself to other computers in the network for consuming bandwidth in the network and corrupting data in the infected computer. …”
Section: Introductionmentioning
confidence: 99%
“…In order to improve the life quality through IoT, valuable services should be rendered. In recent years, IoT services have expanded to improve quality of life in different areas 1‐4 …”
Section: Introductionmentioning
confidence: 99%