2019 2nd International Conference on Signal Processing and Communication (ICSPC) 2019
DOI: 10.1109/icspc46172.2019.8976527
|View full text |Cite
|
Sign up to set email alerts
|

Recent Advances and Countermeasures Against Various Attacks in IoT Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(5 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…In this type of attack, intruders eavesdrop on the wireless channel, intercept the packets transmitted between network entities, distort them, and forward them to the receiver [154].…”
Section: Data Distortion Attacksmentioning
confidence: 99%
“…In this type of attack, intruders eavesdrop on the wireless channel, intercept the packets transmitted between network entities, distort them, and forward them to the receiver [154].…”
Section: Data Distortion Attacksmentioning
confidence: 99%
“…The DoS among the most common attacks against the network layer insert high volumes of useless data packets into the network. Attacker compromised nodes may also refuse connection requests from other devices and nodes on the network [26]. When DoS attacks are conducted en masse involving thousands of attacking nodes that produce erroneous data packets of generous size they become distributed denial of service (DDoS) attacks [21], [27].…”
Section: Network Layer Potential Failuresmentioning
confidence: 99%
“…Flooding and routing attacks that occur in the network layer in turn result in DoS/DDoS type attacks. Owing to the identification of common DoS/DDoS type attacks in both the network [21], [26], [27] and software layers [22], [23], [28] the literature survey supports a reduction from eleven (11) individual to four (4) distinct common malicious attacks on the six (6) common security failures in the IoT ecosystem:…”
Section: Commonality Of Malicious Attacksmentioning
confidence: 99%
“…Malicious Scripts: these involve networks or IoT devices that are connected to the Internet. The attack is carried out by running malicious codes or x-scripts which look like legitimate scripts and which the user must access, to be data theft and systems failure [ 50 ].…”
Section: Classification Of Security Attacksmentioning
confidence: 99%
“…Data distortion attack: these uses code within the software to damage systems or lead to other unwanted impacts and avoid detection by anti-virus applications. The code may be self-activating or activated when the user takes a specific action [ 50 ].…”
Section: Classification Of Security Attacksmentioning
confidence: 99%