Performance of Various Attack Detection Algorithms in IoT
Author(s):
Vaishnavi.S, Dr.Sethukkarasi.T
Keywords:
WSN, Internet-of-Things, Security and attacks
Abstract
IoT is a highly dynamic and radically distributed networked system, composed of a very large number of smart objects producing and consuming information. As the objects involved in IoT are heterogenic nature and these objects communicate through Internet they give rise to many challenging research areas. One such major research challenge in IoT is Security. Securing IoT from different types of attacks is a major challenge. Now IoT is widely applied to social life applications such as smart grid, intelligent transportation, Healthcare, smart security and smart home. IoT can make the usage of all these applications easier with its technology but if it does not ensure security it may lead to major problems like leakage of personal privacy information, etc. In this paper we present a survey of different types of attacks on IoT and discuss the algorithms used to detect these attacks. Specifically we present the most common attacks like DDos attack, Sybil attacks, SIP Flooding attack, man-in the Middle attack and Clone attacks. Finally, we discuss the challenging research issues and future directions for Securing IoT.
Article Details
Unique Paper ID: 146327
Publication Volume & Issue: Volume 4, Issue 12
Page(s): 197 - 202
Article Preview & Download
Share This Article
Join our RMS
Conference Alert
NCSEM 2024
National Conference on Sustainable Engineering and Management - 2024