Smart City Gnosys

Smart city article details

Title Iot Network Attack Types By Application Domains
ID_Doc 33858
Authors Fadli O.; Balboul Y.; Fattah M.; Mazer S.; Elbekkali M.
Year 2023
Published Lecture Notes in Networks and Systems, 635 LNNS
DOI http://dx.doi.org/10.1007/978-3-031-26254-8_80
Abstract In a world dominated by digital technology, the Internet of Things (IoT) has occupied our daily lives beyond our knowledge. It has established an ecosystem that connects multiple systems to provide intelligent performance in each task of our lifestyles and it has made everything and everyone connected to the internet. From wearables to smart cities and smart industries, our hobbies, our movements are facilitated by this technology that greatly improves our quality of life and increases our comfort. Based on low-cost sensors, the IoT provides the possibility to render the several devices and objects around us addressable, identifiable, and locatable. Though the IoT brought infinite benefits, it creates several challenges, especially in security and privacy. These security challenges are complicated due to the variety of IoT protocols that are heterogeneous, serve various requirements, and are utilized in diverse application domains. However, because IoT is commonly deployed in hostile or remote environments and operate without monitoring, preventing attacks and protecting the privacy of sensitive collected data is critical for many IoT applications. This paper represents a detailed study of the general concepts on the security of IoT networks by application domains by describing their vulnerabilities, their security needs. The classification of the types of attacks on IoT networks by application domains is also discussed. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
Author Keywords Attacks; Confidentiality; Internet of Things; Privacy; Security challenges; Vulnerabilities


Similar Articles


Id Similarity Authors Title Published
34811 View0.869Ozalp A.N.; Albayrak Z.; Cakmak M.; Ozdogan E.Layer-Based Examination Of Cyber-Attacks In IotHORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings (2022)
47996 View0.868Chander B.; Gopalakrishnan K.Security Vulnerabilities And Issues Of Traditional Wireless Sensors Networks In IotIntelligent Systems Reference Library, 174 (2019)
47934 View0.867Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
18302 View0.865Choudhary V.; Tanwar S.; Rana A.Demystifying Security And Applications Of Internet Of Things2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021 (2021)
47835 View0.86Kala S.; Nalesh S.Security And Challenges In Iot-Enabled SystemsSystem Assurances: Modeling and Management (2022)
47865 View0.859Awad A.I.; Abawajy J.Security And Privacy In The Internet Of Things: Architectures, Techniques, And ApplicationsSecurity and Privacy in the Internet of Things: Architectures, Techniques, and Applications (2021)
8954 View0.859Dargaoui S.; Azrour M.; El Allaoui A.; Amounas F.; Guezzaz A.; Attou H.; Hazman C.; Benkirane S.; Bouazza S.H.An Overview Of The Security Challenges In Iot EnvironmentEnvironmental Science and Engineering (2023)
29918 View0.857Bhardwaj A.; Kumar M.; Stephan T.; Shankar A.; Ghalib M.R.; Abujar S.Iaf: Iot Attack Framework And Unique TaxonomyJournal of Circuits, Systems and Computers, 31, 2 (2022)
30133 View0.856Makwana R.Ids For Internet Of Things (Iot) And Industrial Iot NetworkArtificial Intelligence for Intrusion Detection Systems (2023)
5719 View0.855Aarthi S.; Krishna A.V.; Prasad M.H.; Nithish M.S.A Unified Predictability For Bot Attack On Iot Devices And Its PlatformsAIP Conference Proceedings, 2405 (2022)