2017 International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2017
DOI: 10.1109/i-smac.2017.8058273
|View full text |Cite
|
Sign up to set email alerts
|

Threat analysis and attacks modelling in routing towards IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Routing information is modified to cause routing loops, dropping packets, increase latency [104], forward false information or result in network segmentation [13,102,104,111,140]. Routing protocols at the network layer are vulnerable to impersonation, spoofing, and routing attacks [104,110,141].…”
Section: Network Layer Attacksmentioning
confidence: 99%
“…Routing information is modified to cause routing loops, dropping packets, increase latency [104], forward false information or result in network segmentation [13,102,104,111,140]. Routing protocols at the network layer are vulnerable to impersonation, spoofing, and routing attacks [104,110,141].…”
Section: Network Layer Attacksmentioning
confidence: 99%
“…Users can then view the report of IoT devices from desktop, android, or web-based applications [12,13] or even can make control over the device [14]. It is essential for securing data transmission in the client-server network model since there are many kinds of attacks within the network [15][16][17]. IoT developers should consider implementing SSL protocol for their system against any possible networking or cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%