2021
DOI: 10.1016/j.comnet.2020.107592
|View full text |Cite
|
Sign up to set email alerts
|

Layer based security in Narrow Band Internet of Things (NB-IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Although the Internet of things is still in the initial stage of development, most countries in the world have invested in a certain degree of technology, standards, application demonstrations, and business models and have achieved certain results [6]. As early as 2009, IBM launched the concept of "Smarter Planet"; the ideal effect of this solution is through the combination of a sensor network and Internet technology, changing the way of communication between people or between people and organizations to achieve thorough perception, extensive interconnection, and in-depth intelligence.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although the Internet of things is still in the initial stage of development, most countries in the world have invested in a certain degree of technology, standards, application demonstrations, and business models and have achieved certain results [6]. As early as 2009, IBM launched the concept of "Smarter Planet"; the ideal effect of this solution is through the combination of a sensor network and Internet technology, changing the way of communication between people or between people and organizations to achieve thorough perception, extensive interconnection, and in-depth intelligence.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, sensor eavesdropping and firmware analysis may also be considered hardware attacks [66,67]. Considering multiple case studies, Jha et al [68] indicated that microrobots with micro-electro-mechanical systems (MEMS) can forge the data in NB-IOTs. Meng et al [48] conducted a comprehensive investigation of several new attacks on voice interfaces in an SHS and believed that the primary security threat in the physical layer should be a jamming attack, in which an adversary sends wireless signals with the same frequency as that in the target network using a high-power RF generator to interfere with or even paralyze all communications.…”
Section: ) Typical Attack Technologiesmentioning
confidence: 99%
“…NB-IoT-based bots with micro-electromechanical systems (MEMS) might be compromised for malicious actions that can pose serious threats to national security. Different security cases from the perspective of hierarchical architecture were analyzed in [68], including attacks using NB-IoT-based bots in SHS. In that study, the authors reported that the MEMS bot could effectively cheat smart devices in the network, thus ruining the security of the SHS [68].…”
Section: ) Protocol Analysis and Improvementmentioning
confidence: 99%
“… Eavesdropping attack: In this type of attack, the eavesdropper captures the data transferred to the IoT node from the base station and utilizes it for further attacks. It could be prevented by keeping the IoT node isolated or by utilizing algorithmic cryptography to prevent these attacks [9].  Fake node injection: A new false node is introduced and is assigned to change the original information and share the incorrect data [10].…”
Section: Physical Layer Attacksmentioning
confidence: 99%