Research Article
IoT Insider Attack - Survey
@INPROCEEDINGS{10.1007/978-3-030-49610-4_3, author={Morshed Chowdhury and Robin Doss and Biplob Ray and Sutharshan Rajasegarar and Sujan Chowdhury}, title={IoT Insider Attack - Survey}, proceedings={Smart Grid and Internet of Things. Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings}, proceedings_a={SGIOT}, year={2020}, month={6}, keywords={IoT Insider attack Mitigation technique IoT application Machine learning}, doi={10.1007/978-3-030-49610-4_3} }
- Morshed Chowdhury
Robin Doss
Biplob Ray
Sutharshan Rajasegarar
Sujan Chowdhury
Year: 2020
IoT Insider Attack - Survey
SGIOT
Springer
DOI: 10.1007/978-3-030-49610-4_3
Abstract
The “Internet of things” (IoT) creating a perfect storm in the smart world. Due to the availability of internet and capabilities of devices, sensors-based technologies becoming popular day by day. It now opens the opportunities for overcoming many new challenges. Any device with on/off capability connecting through the internet via sensor can be an IoT device which includes a coffee machine, light, hand watch, headphones, washing machine, mobile phones, car, CCTV camera and so on. Simply we can say connecting things to people via the internet and controlling remotely is the great advantage of IoT. In our daily life, the IoT is widely used which includes transportation, health, education, security and so on. Imagine how IoT can make our life easier, based on your set alarm when you wake up if it can notify your coffee machine to prepare coffee for you that will save you time. Despite those advantages, the IoT based system is not free from vulnerabilities. Different types of attacks make the system vulnerable and tried to exploit the system and creating obstacles from its growth. Here we will explore IoT attacks and the relevant technologies associated along with machine learning strategies that exist to overcome those obstacles.