A survey on Classification of Cyber-attacks on IoT and IIoT devices

Y. Shah, S. Sengupta
{"title":"A survey on Classification of Cyber-attacks on IoT and IIoT devices","authors":"Y. Shah, S. Sengupta","doi":"10.1109/UEMCON51285.2020.9298138","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) devices have gained popularity in recent years. With the increased usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT devices must be analyzed thoroughly to develop protection mechanisms against them. An attacker’s purpose behind launching an attack is to find a weak link within a network and once discovered, the devices connected to the network become the primary target for the attackers. Industrial Internet of Things (IIoT) emerged due to the popularity of IoT devices and they are used to interconnect machines, sensors, and actuators at large manufacturing plants. By incorporating IIoT at their facilities companies have benefited by reducing operational costs and increasing productivity. However, as IIoT relies on utilizing the Internet to operate it is vulnerable to Cyber-attacks if security is not taken into consideration. After seeing the advantages of IIoT, a new version of smart industries has been introduced called Industry 4.0. Industry 4.0 combines cloud and fog computing, cyber-physical systems (CPS), and data analytics to automate the manufacturing process. This paper surveys the different classifications of attacks that an attacker can launch against these devices and mentions methods of mitigating such attacks1.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"38","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 38

Abstract

Internet of Things (IoT) devices have gained popularity in recent years. With the increased usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT devices must be analyzed thoroughly to develop protection mechanisms against them. An attacker’s purpose behind launching an attack is to find a weak link within a network and once discovered, the devices connected to the network become the primary target for the attackers. Industrial Internet of Things (IIoT) emerged due to the popularity of IoT devices and they are used to interconnect machines, sensors, and actuators at large manufacturing plants. By incorporating IIoT at their facilities companies have benefited by reducing operational costs and increasing productivity. However, as IIoT relies on utilizing the Internet to operate it is vulnerable to Cyber-attacks if security is not taken into consideration. After seeing the advantages of IIoT, a new version of smart industries has been introduced called Industry 4.0. Industry 4.0 combines cloud and fog computing, cyber-physical systems (CPS), and data analytics to automate the manufacturing process. This paper surveys the different classifications of attacks that an attacker can launch against these devices and mentions methods of mitigating such attacks1.
物联网和工业物联网设备网络攻击分类调查
近年来,物联网(IoT)设备越来越受欢迎。随着物联网设备使用量的增加,用户更容易受到网络攻击。必须彻底分析针对物联网设备的威胁,以制定针对它们的保护机制。攻击者发起攻击的目的是寻找网络中的薄弱环节,一旦发现,连接到网络上的设备就成为攻击者的首要目标。工业物联网(IIoT)是由于物联网设备的普及而出现的,它们用于连接大型制造工厂的机器、传感器和执行器。通过将工业物联网纳入其设施,公司可以通过降低运营成本和提高生产率而受益。然而,由于工业物联网依赖于利用互联网进行操作,如果不考虑安全性,它很容易受到网络攻击。在看到IIoT的优势之后,智能工业的新版本被称为工业4.0。工业4.0结合了云和雾计算、网络物理系统(CPS)和数据分析,以实现制造过程的自动化。本文调查了攻击者可以针对这些设备发起的不同类型的攻击,并提到了减轻此类攻击的方法1。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信