2020
DOI: 10.1007/978-3-030-42048-2_23
|View full text |Cite
|
Sign up to set email alerts
|

Selective Forwarding Attack on IoT Home Security Kits

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
(6 reference statements)
0
2
0
Order By: Relevance
“…The global monitoring capability and the infrastructure of fog computing are exploited in [30]. The vulnerability of home security devices to the SFA is demonstrated with some recommendations and solutions [31]. The authors of [20] propose one of the earliest IDS for the IoT to prevent the sink-hole attack and the SFA.…”
Section: Related Workmentioning
confidence: 99%
“…The global monitoring capability and the infrastructure of fog computing are exploited in [30]. The vulnerability of home security devices to the SFA is demonstrated with some recommendations and solutions [31]. The authors of [20] propose one of the earliest IDS for the IoT to prevent the sink-hole attack and the SFA.…”
Section: Related Workmentioning
confidence: 99%
“…Currently, the Internet of Things (IoT) devices, such as industrial control and wearable devices, are becoming an important part of cyberspace and play an indispensable role in daily human life. However, due to the limitation of hardware resources, IoT devices usually cannot integrate sophisticated security detection or protection mechanisms and tend to be victims of cyber attacks [1]. Meanwhile, due to the lack of management, compromised IoT devices may lose control or be abused as a foothold for further network attacks for a long time before being noticed [2].…”
Section: Introductionmentioning
confidence: 99%
“…Due to resource constraints and insecure designs, IoT devices are prone to be involved in cyber-attacks, ranging from being the target [22,45] to being exploited to create a botnet to mount a massive Distributed Denial of Service attack [3,16]. Therefore, it is necessary and desirable to be able to automatically detect whether certain IoT devices might be vulnerable or could be exploited in cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%