2022
DOI: 10.1109/jiot.2021.3079916
|View full text |Cite
|
Sign up to set email alerts
|

Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

Abstract: Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only the device itself, but also the application field in which the IoT device operates. Evidently, identifying and addre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
2

Relationship

3
7

Authors

Journals

citations
Cited by 91 publications
(58 citation statements)
references
References 70 publications
(93 reference statements)
0
37
0
Order By: Relevance
“…We also argue that the attackers can further attack a communication without redirecting the whole data packet; instead, the attackers can infect selected data packets for specific information. Finally, an attacker can flood the network with unnecessary data packets to collapse the bandwidth or resources of an attacked system, which will consequently impact the performance of the complete system [171].…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
“…We also argue that the attackers can further attack a communication without redirecting the whole data packet; instead, the attackers can infect selected data packets for specific information. Finally, an attacker can flood the network with unnecessary data packets to collapse the bandwidth or resources of an attacked system, which will consequently impact the performance of the complete system [171].…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
“…Specifically, we provide the details of attack exploitation of an HVAC system (load-side) which can lead to tampering of operation information and system configuration, leading even to denialof-service (DoS) conditions. A similar type of attack can also be performed on the distributed energy resources (DER) side, e.g., solar inverters, in which firmware backdoors could enable access to weakly encrypted user passwords, which could then be reversed allowing unauthorized access [23], [24].…”
Section: Load-altering Attack Scenario On Iotmentioning
confidence: 99%
“…The IoT is a network of connected devices including smart appliances (e.g., smart thermostats, air-conditioning, heat pumps, EVCS points, etc. ), enabling the exchange of information between devices and users leveraging wired and wireless connections [80]- [82]. These IoT-enabled devices are connected to the load-end of DERs and their operation is typically orchestrated remotely by their end users.…”
Section: B Der Device Levelmentioning
confidence: 99%