6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019) 2019
DOI: 10.5121/csit.2019.91321
|View full text |Cite
|
Sign up to set email alerts
|

Security Framework for IoT Devices against Cyber-attacks

Abstract: Internet of Things (IoT) is the interconnection of heterogeneous smart devices through the Internet with diverse application areas. The huge number of smart devices and the complexity of networks has made it impossible to secure the data and communication between devices. Various conventional security controls are insufficient to prevent numerous attacks against these information-rich devices. Along with enhancing existing approaches, a peripheral defence, Intrusion Detection System (IDS), proved efficient in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 51 publications
0
4
0
Order By: Relevance
“…2) Routing Attacks Well established routing attacks [smith] on the network layer have become common due to the fact the routing configurations of network gateways and switches are unencrypted [9]. Malicious attackers may alter these configurations [9], [25] creating looping communications [9]. Routing attacks break the connection between the device layer and other layers within the IoT architecture.…”
Section: Network Layer Potential Failuresmentioning
confidence: 99%
“…2) Routing Attacks Well established routing attacks [smith] on the network layer have become common due to the fact the routing configurations of network gateways and switches are unencrypted [9]. Malicious attackers may alter these configurations [9], [25] creating looping communications [9]. Routing attacks break the connection between the device layer and other layers within the IoT architecture.…”
Section: Network Layer Potential Failuresmentioning
confidence: 99%
“…The authors postulate that one of the ways to prevent the attacks is to understand how vulnerable spots on IoT devices are exploited to trace back to the weakest link of the network [10]. Regarding intelligent mechanisms that can detect unfamiliar intrusions and find unusual activities, Tabassum & Lebda, consider the Helium hotspot and its complexities in smart IoT, giving the possibility to attackers to turn devices such as T.V., watches, CCTV cameras, and even smart pet collars into harmful botnets to be attacked [11]. Biswajit reviewed LoRaWAN architecture by exploring the various network features and the different LoRa from wireless technologies in long-range transmissions with low power consumption [8].…”
Section: Related Workmentioning
confidence: 99%
“…Further on, the comprehensive search of IoT security perception resulted in many (nearly one thousand) quality review conference and journal papers as well as book chapters dealing with IoT security and privacy such as Hwang [40], Abomhara et al [41], Sicari et al [42], Sadeghi et al [43], Roman et al [44], Maple [45], Sivaraman et al [46], Giraldo et al [47], Makherjee et al [48], Yang et al [49], Lin et al [50], Stergiou et al [51], Zhou et al [52], Frustaci et al [53], Miorandi et al [54], Hasan et al [55], Mawgoud et al [56], Tabassum et al [57], Ataç et al [58], Silaghi et al [59], Guan et al [60], etc. They provide overviews of current state in this domain and provide open research challenges and issues to be solved by future research, but all that is out of the scope of this paper, i.e., they do not address the impact of security perception on QoE in the IoT environment.…”
Section: Impact Of Security Perception On Qoementioning
confidence: 99%