Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.48550/arxiv.1702.03681
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

Abstract: Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if considered at all) is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(43 citation statements)
references
References 0 publications
0
43
0
Order By: Relevance
“…The necessity of the end-to-end approach is best illustrated by the recently surging attacks against IoT devices [29], [30]. By securing the data end-to-end (and avoiding re-encryption in several points), the attack surface for successfully modifying and/or exfiltrating the patient data is greatly reduced: on one hand, we ensure that the Internet-exposed gateway cannot leak the data, and on the other hand, the data is less exposed to the networking and computational infrastructure of the cloud.…”
Section: Data Key Managementmentioning
confidence: 99%
“…The necessity of the end-to-end approach is best illustrated by the recently surging attacks against IoT devices [29], [30]. By securing the data end-to-end (and avoiding re-encryption in several points), the attack surface for successfully modifying and/or exfiltrating the patient data is greatly reduced: on one hand, we ensure that the Internet-exposed gateway cannot leak the data, and on the other hand, the data is less exposed to the networking and computational infrastructure of the cloud.…”
Section: Data Key Managementmentioning
confidence: 99%
“…This may finally result in a distributed DoS attack against the target servers. 54 The IoT devices are usually designed with almost no security compared to other smart devices such as smart phones and computers. This danger was not recognized until 2016; therefore, more research is required to overcome this threat in the future.…”
Section: Botnet Activities In Iot-based Smart Citiesmentioning
confidence: 99%
“…Angrishi et al [17] claim that the Internet of Things is becoming the Internet of Vulnerabilities. Their work takes a closer look at the evolution of malware in IoT and how it has progressed up to the most predominant malware, Mirai.…”
Section: Related Literaturementioning
confidence: 99%