{"title":"物联网网络中人中间攻击分类","authors":"Devpriya Panda, Brojo Kishore Mishra, Kavita Sharma","doi":"10.1109/ICAC3N56670.2022.10074170","DOIUrl":null,"url":null,"abstract":"Recent trends in IoT networks suggests that the more the use of IoT devices, the more the threat to the network. There are various threats posed by the attackers on this type of networks. In this work we have identified Man-in-the -Middle attack for study and understand its effect on the networks like IoT, IoMT, VANET etc. Various authors have suggested several ways to mitigate the attack. Some of them have used some Machine learning techniques such as Random Forest, Decision Trees and deep learning techniques. After analyzing the works of various authors, we have tried to identify some topics for further investigation and then we would try to summarize the study in the conclusion.","PeriodicalId":342573,"journal":{"name":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","volume":" 115","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Taxonomy on Man-in-the-Middle Attack in IoT Network\",\"authors\":\"Devpriya Panda, Brojo Kishore Mishra, Kavita Sharma\",\"doi\":\"10.1109/ICAC3N56670.2022.10074170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent trends in IoT networks suggests that the more the use of IoT devices, the more the threat to the network. There are various threats posed by the attackers on this type of networks. In this work we have identified Man-in-the -Middle attack for study and understand its effect on the networks like IoT, IoMT, VANET etc. Various authors have suggested several ways to mitigate the attack. Some of them have used some Machine learning techniques such as Random Forest, Decision Trees and deep learning techniques. After analyzing the works of various authors, we have tried to identify some topics for further investigation and then we would try to summarize the study in the conclusion.\",\"PeriodicalId\":342573,\"journal\":{\"name\":\"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)\",\"volume\":\" 115\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAC3N56670.2022.10074170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAC3N56670.2022.10074170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Taxonomy on Man-in-the-Middle Attack in IoT Network
Recent trends in IoT networks suggests that the more the use of IoT devices, the more the threat to the network. There are various threats posed by the attackers on this type of networks. In this work we have identified Man-in-the -Middle attack for study and understand its effect on the networks like IoT, IoMT, VANET etc. Various authors have suggested several ways to mitigate the attack. Some of them have used some Machine learning techniques such as Random Forest, Decision Trees and deep learning techniques. After analyzing the works of various authors, we have tried to identify some topics for further investigation and then we would try to summarize the study in the conclusion.