2020
DOI: 10.1007/978-981-15-6198-6_20
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attack in Internet of Things: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(33 citation statements)
references
References 10 publications
0
33
0
Order By: Relevance
“…The over the air update of these nodes' firmware or software gives the attacker a chance to inject malicious or false code in the node causing Malicious code injection or False data injection attacks [27]. Side channel attack based on laser, power consumption, and timing can occur in this layer [28]. The nodes present in an open environment are vulnerable to eavesdropping attacks at the time of data transmission or similar events [29].…”
Section: Security Issues In Iot Domainmentioning
confidence: 99%
“…The over the air update of these nodes' firmware or software gives the attacker a chance to inject malicious or false code in the node causing Malicious code injection or False data injection attacks [27]. Side channel attack based on laser, power consumption, and timing can occur in this layer [28]. The nodes present in an open environment are vulnerable to eavesdropping attacks at the time of data transmission or similar events [29].…”
Section: Security Issues In Iot Domainmentioning
confidence: 99%
“…• Side-channel attacks: Side-channel signals carry along with important details in regards to the operation of IoT devices and it allows for the discovery of irregular activities. [83][84][85] Malicious firmware and alteration of devices and data can be detected with this analysis providing insights and protection against side-channel attacks and many integrity-related attacks. 74…”
Section: Security Challenges In Iot Environmentmentioning
confidence: 99%
“…Furthermore, in recent years there has been a lot of research conducted in designing power distribution solutions for addressing the SCA vulnerability of low-power computing devices [1], [4], [5], [16], including IoT devices [6]. Most of these designs address the SCA issue at power electronics or silicon level, also keeping power efficiency in mind [18], [19].…”
Section: State Of the Art And Related Workmentioning
confidence: 99%