File(s) not publicly available
IoT insider attack: Survey
conference contributionposted on 03.11.2020, 00:00 by R Doss, Biplob RayBiplob Ray, S Rajasegarar, Sujan ChowdhurySujan Chowdhury
The “Internet of things” (IoT) creating a perfect storm in the smart world. Due to the availability of internet and capabilities of devices, sensors-based technologies becoming popular day by day. It now opens the opportunities for overcoming many new challenges. Any device with on/off capability connecting through the internet via sensor can be an IoT device which includes a coffee machine, light, hand watch, headphones, washing machine, mobile phones, car, CCTV camera and so on. Simply we can say connecting things to people via the internet and controlling remotely is the great advantage of IoT. In our daily life, the IoT is widely used which includes transportation, health, education, security and so on. Imagine how IoT can make our life easier, based on your set alarm when you wake up if it can notify your coffee machine to prepare coffee for you that will save you time. Despite those advantages, the IoT based system is not free from vulnerabilities. Different types of attacks make the system vulnerable and tried to exploit the system and creating obstacles from its growth. Here we will explore IoT attacks and the relevant technologies associated along with machine learning strategies that exist to overcome those obstacles.