2020 International Conference on Communication and Signal Processing (ICCSP) 2020
DOI: 10.1109/iccsp48568.2020.9182055
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Prevention of Attacks on IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Authenticity ensures an authentic message. Message Authentication Code (MAC) is brief information used for message authentication and provides the message's system has seen various attacks over the past few years, making manufacturers and consumers more aware of IoT products [41,42].…”
Section: Iot Attacksmentioning
confidence: 99%
“…Authenticity ensures an authentic message. Message Authentication Code (MAC) is brief information used for message authentication and provides the message's system has seen various attacks over the past few years, making manufacturers and consumers more aware of IoT products [41,42].…”
Section: Iot Attacksmentioning
confidence: 99%
“…The processing layer contains various types of technology, such as data analysis and data storage. The most popular type of attack on the IoT processing layer is a cloud attack since the cloud receives data sent at this phase [80]. The attacker will use trojan worms, horse applications, spyware, malware, and malicious scripting software attacks that can damage IoT system devices in the application layer.…”
Section: Iot Attacksmentioning
confidence: 99%
“…After that, the result once again passes through the Rabbit PRNG with the number of system iterations either two for Modified Rabbit v1 or one for Modified Rabbit v2. (5). The resulting key from the second Rabbit PRNG is the final key produced by the proposed Modified Rabbit PRNG.…”
Section: New Key Generation Algorithm For Lorawanmentioning
confidence: 99%
“…LoRaWAN is one of the most popular LPWAN standards quickly adopted in IoT applications. The paper [ 5 ] indicates that 70% of the IoT devices are highly vulnerable to security attacks. Given the observed steady growth of IoT devices, IoT security becomes one of the key factors ensuring internet reliability.…”
Section: Introductionmentioning
confidence: 99%