Performance of Various Attack Detection Algorithms in IoT
Author(s):
Vaishnavi.S, Dr.Sethukkarasi.T
Keywords:
WSN, Internet-of-Things, Security and attacks
Abstract
IoT is a highly dynamic and radically distributed networked system, composed of a very large number of smart objects producing and consuming information. As the objects involved in IoT are heterogenic nature and these objects communicate through Internet they give rise to many challenging research areas. One such major research challenge in IoT is Security. Securing IoT from different types of attacks is a major challenge. Now IoT is widely applied to social life applications such as smart grid, intelligent transportation, Healthcare, smart security and smart home. IoT can make the usage of all these applications easier with its technology but if it does not ensure security it may lead to major problems like leakage of personal privacy information, etc. In this paper we present a survey of different types of attacks on IoT and discuss the algorithms used to detect these attacks. Specifically we present the most common attacks like DDos attack, Sybil attacks, SIP Flooding attack, man-in the Middle attack and Clone attacks. Finally, we discuss the challenging research issues and future directions for Securing IoT.
Article Details
Unique Paper ID: 146327

Publication Volume & Issue: Volume 4, Issue 12

Page(s): 197 - 202
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews