2019
DOI: 10.4108/eai.13-7-2018.159803
|View full text |Cite
|
Sign up to set email alerts
|

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service

Abstract: Internet of Things (IoT) exposes various vulnerabilities at different levels. One such exploitable vulnerability is Denial of Service (DoS). In this work, we focus on a large-scale extensive study of various forms of DoS and how it can be exploited in different protocols of IoT. We propose an attack and defense framework called OWL which is tailored for IoT and that can perform various forms of DoS on IP, Bluetooth, and Zigbee devices. We consider various DoS vulnerabilities such as illegitimate packet injecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The domain of physical attacks is comprised by attacks where the adversary can have physical access to the IoT system. Attacks under this category are tampering attacks, malicious code injections, radio frequency interference/jamming, fake node injections, sleep denial attack (or sleep deprivation), side channel attacks, and permanent DoS (PDoS) [34]. Network attacks occur when the IoT network is manipulated inhibiting the IoT system's nominal operation.…”
Section: Social Engineeringmentioning
confidence: 99%
“…The domain of physical attacks is comprised by attacks where the adversary can have physical access to the IoT system. Attacks under this category are tampering attacks, malicious code injections, radio frequency interference/jamming, fake node injections, sleep denial attack (or sleep deprivation), side channel attacks, and permanent DoS (PDoS) [34]. Network attacks occur when the IoT network is manipulated inhibiting the IoT system's nominal operation.…”
Section: Social Engineeringmentioning
confidence: 99%
“…Devices: Several security and privacy analyses have been conducted against IoT devices [15][16][17][18]. Interfacing with physical devices can reveal behavioural characteristics, particularly those where user interaction is required.…”
Section: Motivationmentioning
confidence: 99%
“…This survey included academic articles, whitepapers, and technical reports available from open public sources. The most widely used example is the malware BrickerBot [5], which has undergone considerable investigation, most notably in the study by Sachidananda et al [12]. Their research offers an in-depth analysis of BrickerBot's capabilities, targeting methods, and potential impact.…”
Section: Introductionmentioning
confidence: 99%