S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar
{"title":"物联网环境下各种攻击的最新进展及应对措施","authors":"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar","doi":"10.1109/ICSPC46172.2019.8976527","DOIUrl":null,"url":null,"abstract":"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Recent Advances and Countermeasures Against Various Attacks in IoT Environment\",\"authors\":\"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar\",\"doi\":\"10.1109/ICSPC46172.2019.8976527\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.\",\"PeriodicalId\":321652,\"journal\":{\"name\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Signal Processing and Communication (ICSPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSPC46172.2019.8976527\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976527","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recent Advances and Countermeasures Against Various Attacks in IoT Environment
Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.