Performance of Various Attack Detection Algorithms in IoT

  • Unique Paper ID: 146327
  • PageNo: 197-202
  • Abstract:
  • IoT is a highly dynamic and radically distributed networked system, composed of a very large number of smart objects producing and consuming information. As the objects involved in IoT are heterogenic nature and these objects communicate through Internet they give rise to many challenging research areas. One such major research challenge in IoT is Security. Securing IoT from different types of attacks is a major challenge. Now IoT is widely applied to social life applications such as smart grid, intelligent transportation, Healthcare, smart security and smart home. IoT can make the usage of all these applications easier with its technology but if it does not ensure security it may lead to major problems like leakage of personal privacy information, etc. In this paper we present a survey of different types of attacks on IoT and discuss the algorithms used to detect these attacks. Specifically we present the most common attacks like DDos attack, Sybil attacks, SIP Flooding attack, man-in the Middle attack and Clone attacks. Finally, we discuss the challenging research issues and future directions for Securing IoT.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{146327,
        author = {Vaishnavi.S and Dr.Sethukkarasi.T},
        title = {Performance of Various Attack Detection Algorithms in IoT},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {12},
        pages = {197-202},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=146327},
        abstract = {IoT is a highly dynamic and radically distributed networked system, composed of a very large number of smart objects producing and consuming information. As the objects involved in IoT are heterogenic nature and these objects communicate through Internet they give rise to many challenging research areas. One such major research challenge in IoT is Security. Securing IoT from different types of attacks is a major challenge. Now IoT is widely applied to social life applications such as smart grid, intelligent transportation, Healthcare, smart security and smart home. IoT can make the usage of all these applications easier with its technology but if it does not ensure security it may lead to major problems like leakage of personal privacy information, etc. In this paper we present a survey of different types of attacks on IoT and discuss the algorithms used to detect these attacks. Specifically we present the most common attacks like DDos attack, Sybil attacks, SIP Flooding attack, man-in the Middle attack and Clone attacks. Finally, we discuss the challenging research issues and future directions for Securing IoT.},
        keywords = {WSN, Internet-of-Things, Security and attacks},
        month = {},
        }

Cite This Article

Vaishnavi.S, , & Dr.Sethukkarasi.T, (). Performance of Various Attack Detection Algorithms in IoT. International Journal of Innovative Research in Technology (IJIRT), 4(12), 197–202.

Related Articles