15Securing IoT Devices Against MITM and DoS Attacks: An Analysis

VICKY TYAGI, AMAR SARASWAT, ASHWANI KUMAR, SHALINI GAMBHIR

K. R. Mangalam University, Gurgaon, India

Email: vickytyagi3030@gmail.com, bamar.saraswat@krmangalam.edu.in, cashwani.kumar@krmangalam.edu.in, dshalinichawla2006@gmail.com

Abstract

The internet of things (IoT) is a network that connects various sensors and objects so that they can communicate with one another without the need for human intervention. The IoT is a vast network of linked devices that is rapidly evolving, making human life much easier than it has been in the past. Most operations, such as booking a hotel stay with a simple text message, may now be accomplished with a simple click. The IoT now uses artificial intelligence as well as machine learning to make it user-adaptive, in addition to connecting devices across a network. Because the IoT is doing so many things at once, it requires a lot of power, but even more critically, it requires a lot of data. IoT networks are built on low-power, lossy networks (LLN).

In this chapter, we investigate which devices are most attacked, as well as the most common attacks carried out by hackers, such as denial-of-service (DoS) attacks, man-inthe-middle (MITM) attacks, forgery, chosen-ciphertext attack (CCA), and replay attacks on IoT devices to gain data access. Many attacks are discussed, most of which can be stopped simply by implementing end-to-end encryption on the network. End-to-end encryption can ...

Get Reshaping Intelligent Business and Industry now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.