2019
DOI: 10.1007/978-3-030-19813-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Smart Thermostat as a Part of IoT Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The tests were performed in three different scenarios, each lasting 90 s on the same network topology. The authors' previous experience with DDoS attacks [17,28,30] conducted on various devices, pointed to the fact that a medium-sized botnet, as used in the experiments in the article, can completely flood the device in 60 s, and the experiment will show the result. Another 30 s were examined to capture the recovery of the IoT device after the end of the 60 s attack.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The tests were performed in three different scenarios, each lasting 90 s on the same network topology. The authors' previous experience with DDoS attacks [17,28,30] conducted on various devices, pointed to the fact that a medium-sized botnet, as used in the experiments in the article, can completely flood the device in 60 s, and the experiment will show the result. Another 30 s were examined to capture the recovery of the IoT device after the end of the 60 s attack.…”
Section: Resultsmentioning
confidence: 99%
“…All IoT-specific components need to be considered for IoT security. Figure 1 Most current research in this area is focused on DDoS attacks and IoT in terms of involving IoT devices in DDoS attacks, e.g., [16][17][18]; less attention is paid to DDoS attacks conducted on the IoT devices themselves, e.g., [2,19], nor on the response of IoT sensors or the possibility that communication with the human user has not been taken into account. The possibility of disabling the smart-home personal assistant system using a DDoS attack is addressed in, e.g., [20], where Overstreet et al present an attack using a DDoS SYN flood attack on Amazon Echo version 2, testing the verbal response to the questions asked.…”
Section: Methodsmentioning
confidence: 99%