Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Brief Review of Cyber Attacks on Internet of Things and its Mitigation Techniques


Affiliations
1 National Advanced IPv6 Centre, Universiti Sains Malaysia, 11800 Gelugor, Malaysia
     

   Subscribe/Renew Journal


Since the inception of ARPANET almost 50 years ago, the Internet has come a long way to the point it has become as important as electricity and water supply. It has evolved from connecting computers and servers and computers to connecting “things”. Internet of Things or IoT as considered to be the next wave of the Internet development. As with any new technology, IoT also suffers from various security issues and vulnerabilities due to its design that is new and untested against attacks. Furthermore, IoT device manufacturers are focused on getting their product marketed at the soonest thus causing security taking the backseat. This paper provides an overview of the potential attacks that can be carried out on IoT devices and outline how these attacks can be mitigated.


Keywords

Internet of Things, Cyber Security, Cyber-Attack, Attack Mitigation.
User
Subscription Login to verify subscription
Notifications
Font Size


  • A Brief Review of Cyber Attacks on Internet of Things and its Mitigation Techniques

Abstract Views: 475  |  PDF Views: 0

Authors

Selvakumar Manickam
National Advanced IPv6 Centre, Universiti Sains Malaysia, 11800 Gelugor, Malaysia

Abstract


Since the inception of ARPANET almost 50 years ago, the Internet has come a long way to the point it has become as important as electricity and water supply. It has evolved from connecting computers and servers and computers to connecting “things”. Internet of Things or IoT as considered to be the next wave of the Internet development. As with any new technology, IoT also suffers from various security issues and vulnerabilities due to its design that is new and untested against attacks. Furthermore, IoT device manufacturers are focused on getting their product marketed at the soonest thus causing security taking the backseat. This paper provides an overview of the potential attacks that can be carried out on IoT devices and outline how these attacks can be mitigated.


Keywords


Internet of Things, Cyber Security, Cyber-Attack, Attack Mitigation.

References