Proceedings of the 2nd International Conference on Networking, Information Systems &Amp; Security 2019
DOI: 10.1145/3320326.3320402
|View full text |Cite
|
Sign up to set email alerts
|

Study of the Different Security Threats on the Internet of Things and their Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…The proposition validates important points of security for IoT using the MQTT protocol. The proposed solution is secure against: c. Man in the middle attack: The attacker interfere between two nodes by monitoring, eavesdropping, and controlling the communication between the two sensor nodes to access the restricted data [27], d. The replay attack and the offline password guessing attack: even if the attacker can guess a password, the parameter K in the (4) of the AugPAKE Algorithm is derived independently from the guessed password. We make this Table 3 which summarize some advantages of our proposed solution compared with some previous works, some of these advantages: User anonymity, mutual authentication, data confidentiality data privacy, data integrity, and robustness against some attacks like Man in the middle, the offline password guessing attack, the replay attack.…”
Section: Security Discussionmentioning
confidence: 99%
“…The proposition validates important points of security for IoT using the MQTT protocol. The proposed solution is secure against: c. Man in the middle attack: The attacker interfere between two nodes by monitoring, eavesdropping, and controlling the communication between the two sensor nodes to access the restricted data [27], d. The replay attack and the offline password guessing attack: even if the attacker can guess a password, the parameter K in the (4) of the AugPAKE Algorithm is derived independently from the guessed password. We make this Table 3 which summarize some advantages of our proposed solution compared with some previous works, some of these advantages: User anonymity, mutual authentication, data confidentiality data privacy, data integrity, and robustness against some attacks like Man in the middle, the offline password guessing attack, the replay attack.…”
Section: Security Discussionmentioning
confidence: 99%
“…As the system is implemented locally, with no internet access, possible attacks include: Physical attacks: hardware devices can become damaged or intentionally removed from the plug, thereby hindering the system’s functionality. Insecure device configuration: vulnerabilities in device settings can be exploited to gain unauthorized access or disrupt network operations [ 57 ]. Device-to-device interception: even without internet access, an attacker could position between two devices within the LAN and intercept the traffic exchanged between them.…”
Section: Design and Implementation Of The Proposed Sedar Systemmentioning
confidence: 99%
“… Data manipulation: an attacker positioned between two devices can modify the data being exchanged between them. While the modification might not have the same impact as altering internet traffic, it could still lead to unintended consequences within the local network [ 57 ]. Credential harvesting: An attacker might trick users within the local network into revealing sensitive information, such as login credentials, through techniques like phishing or social engineering [ 57 ].…”
Section: Design and Implementation Of The Proposed Sedar Systemmentioning
confidence: 99%
See 2 more Smart Citations