A survey on Classification of Cyber-attacks on IoT and IIoT devices

被引:0
作者
Shah, Yash [1 ]
Sengupta, Shamik [1 ]
机构
[1] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
来源
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2020年
关键词
IoT; IIoT; Industry; 4.0; Cyber-attacks; Cybersecurity; Cloud Computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) devices have gained popularity in recent years. With the increased usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT devices must be analyzed thoroughly to develop protection mechanisms against them. An attacker's purpose behind launching an attack is to find a weak link within a network and once discovered, the devices connected to the network become the primary target for the attackers. Industrial Internet of Things (IIoT) emerged due to the popularity of IoT devices and they are used to interconnect machines, sensors, and actuators at large manufacturing plants. By incorporating IIoT at their facilities companies have benefited by reducing operational costs and increasing productivity. However, as IIoT relies on utilizing the Internet to operate it is vulnerable to Cyber-attacks if security is not taken into consideration. After seeing the advantages of IIoT, a new version of smart industries has been introduced called Industry 4.0. Industry 4.0 combines cloud and fog computing, cyber-physical systems (CPS), and data analytics to automate the manufacturing process. This paper surveys the different classifications of attacks that an attacker can launch against these devices and mentions methods of mitigating such attacks(1).
引用
收藏
页码:406 / 413
页数:8
相关论文
共 17 条
[1]  
Abdalrahman G. A., 2019, P 2019 7 INT S DIGIT, P1
[2]  
Al-Jaroodi Jameela, 2018, ACM SIGBED Review, V15, P29, DOI 10.1145/3292384.3292389
[3]  
Alam T, 2018, INT J SCI RES COMPUT, V3
[4]  
Anirudh M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), P11
[5]  
Babu Parsam Dinesh, 2019, 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), P109, DOI 10.1109/ICONSTEM.2019.8918782
[6]   Denial of Service Attack on IoT System [J].
Chen, Qifeng ;
Chen, Haoming ;
Cai, Yanpu ;
Zhang, Yanqi ;
Huang, Xin .
2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, :755-758
[7]  
Dua Aneesh, 2019, 2019 4th International Conference on Information Systems and Computer Networks (ISCON), P636, DOI 10.1109/ISCON47742.2019.9036313
[8]  
Hassanzadeh A, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P795, DOI 10.1109/WF-IoT.2015.7389155
[9]  
Imani A, 2018, 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), P264, DOI 10.1109/ISTEL.2018.8661044
[10]  
Karimullin Kamil, 2019, 2019 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC), DOI 10.1109/CLEOE-EQEC.2019.8871714