File(s) not publicly available

IoT insider attack: Survey

conference contribution
posted on 03.11.2020, 00:00 by R Doss, Biplob RayBiplob Ray, S Rajasegarar, Sujan ChowdhurySujan Chowdhury
The “Internet of things” (IoT) creating a perfect storm in the smart world. Due to the availability of internet and capabilities of devices, sensors-based technologies becoming popular day by day. It now opens the opportunities for overcoming many new challenges. Any device with on/off capability connecting through the internet via sensor can be an IoT device which includes a coffee machine, light, hand watch, headphones, washing machine, mobile phones, car, CCTV camera and so on. Simply we can say connecting things to people via the internet and controlling remotely is the great advantage of IoT. In our daily life, the IoT is widely used which includes transportation, health, education, security and so on. Imagine how IoT can make our life easier, based on your set alarm when you wake up if it can notify your coffee machine to prepare coffee for you that will save you time. Despite those advantages, the IoT based system is not free from vulnerabilities. Different types of attacks make the system vulnerable and tried to exploit the system and creating obstacles from its growth. Here we will explore IoT attacks and the relevant technologies associated along with machine learning strategies that exist to overcome those obstacles.

History

Editor

Deng D-J; Pang A-C; LIn C-C

Volume

LNICST 324

Start Page

28

End Page

41

Number of Pages

14

Start Date

05/12/2019

Finish Date

06/12/2019

ISBN-13

9783030496098

Location

TaiChung, Taiwan

Publisher

Springer

Place of Publication

Cham, Switzerland

Peer Reviewed

Yes

Open Access

No

External Author Affiliations

Deakin University

Author Research Institute

Centre for Intelligent Systems

Era Eligible

Yes

Name of Conference

3rd EAI International Conference (SGIoT 2019)