scispace - formally typeset
Open AccessJournal ArticleDOI

DoS Attacks in IoT Systems and Proposed Solutions

TLDR
This article surveys denial-of-service (DoS) attacks that occur in the network layer of IoT systems and the impact on various aspects, along with several distinct DoS attack mitigation methods.
Abstract
The internet of things (IoT) has been gaining attention in the past decade, and this rapid growth is due to the many different advantages delivered towards achieving a smart world. However, security is one of the biggest challenges, as it builds upon the internet. This article surveys denial-of-service (DoS) attacks that occur in the network layer of IoT systems and the impact on various aspects. The Smurf and SYN flood attacks are briefly discussed along with several distinct DoS attack mitigation methods. Two DoS mitigation technologies implemented by IoT security companies are discussed as a case study.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network

TL;DR: In this article, the authors investigated ping flood attack pattern recognition on IoT networks and used the K-means algorithm to produce the clustering results, which achieved an accuracy of 99.94%.
Journal ArticleDOI

Detections of IoT Attacks via Machine Learning-Based Approaches with Cooja

TL;DR: The decision tree-based approach efficiently manipulates and analyzes the KoÜ-6LoWPAN-IoT dataset, generated via the Cooja simulator, to detect inconsistent behavior and classify malicious activities.
Proceedings ArticleDOI

Anomaly Detection for IoT Security: Comprehensive Survey

TL;DR: In this article , the authors discuss the challenges faced by smart devices that make use of IoT technology, in detecting anomalous behaviors in threat and risk analysis domains, as well as have an insight into the research trends, challenges and limitations in this domain.
Journal ArticleDOI

Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking

TL;DR: In this article , the authors present a framework in which the security of a digital twins (DT) can be analyzed with the help of a formal verification technique, where the security properties of a DT system are represented as a state-transition system and security properties are captured in temporal logic.
Journal ArticleDOI

Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking

- 01 Jan 2023 - 
TL;DR: In this article , the authors present a framework in which the security of a digital twins (DT) can be analyzed with the help of a formal verification technique and the security properties of the DT system are represented as a state-transition system.
References
More filters
Journal ArticleDOI

Security of the Internet of Things: perspectives and challenges

TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Journal ArticleDOI

Internet of Things: Architectures, Protocols, and Applications

TL;DR: This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.
Journal ArticleDOI

IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

TL;DR: A reasoned comparison of the considered IoT technologies with respect to a set of qualifying security attributes, namely integrity, anonymity, confidentiality, privacy, access control, authentication, authorization, resilience, self organization is concluded.
Proceedings ArticleDOI

A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)

TL;DR: The current prominence and future promises of the Internet of Things, Internet of Everything, IoE and Internet of Nano Things are extensively reviewed and a summary survey report is presented.
Journal ArticleDOI

IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey.

TL;DR: This paper is presenting an overview about different layered architectures of IoT and attacks regarding security from the perspective of layers, and suggested a new secure layered architecture of IoT to overcome these issues.