Security Weaknesses and Attacks on the Internet of Things Applications
Title | Security Weaknesses and Attacks on the Internet of Things Applications |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Mohammad, Z., Qattam, T. A., Saleh, K. |
Conference Name | 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) |
Keywords | Data collection, healthcare, Human Behavior, Internet, Internet of Things, Internet of Things applications, IoT applications, IoT attacks, IoT devices, IoT environment, Metrics, objects information, policy-based governance, privacy, Protocols, pubcrawl, resilience, security, security of data, security weaknesses, smart campus, smart car, smart farm, smart home, Smart homes, Wireless sensor networks |
Abstract | Internet of Things (IoT) is a contemporary concept for connecting the existing things in our environment with the Internet for a sake of making the objects information are accessible from anywhere and anytime to support a modern life style based on the Internet. With the rapid development of the IoT technologies and widely spreading in most of the fields such as buildings, health, education, transportation and agriculture. Thus, the IoT applications require increasing data collection from the IoT devices to send these data to the applications or servers which collect or analyze the data, so it is a very important to secure the data and ensure that do not reach a malicious adversary. This paper reviews some attacks in the IoT applications and the security weaknesses in the IoT environment. In addition, this study presents the challenges of IoT in terms of hardware, network and software. Moreover, this paper summarizes and points to some attacks on the smart car, smart home, smart campus, smart farm and healthcare. |
URL | https://ieeexplore.ieee.org/document/8717411 |
DOI | 10.1109/JEEIT.2019.8717411 |
Citation Key | mohammad_security_2019 |
- privacy
- wireless sensor networks
- Smart homes
- Smart Home
- smart farm
- smart car
- smart campus
- security weaknesses
- security of data
- security
- resilience
- pubcrawl
- Protocols
- Data collection
- policy-based governance
- objects information
- Metrics
- IoT environment
- IoT devices
- IoT attacks
- IoT applications
- Internet of Things applications
- Internet of Things
- internet
- Human behavior
- Healthcare