Smart Grid and Internet of Things. Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings

Research Article

IoT Insider Attack - Survey

Download
115 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-49610-4_3,
        author={Morshed Chowdhury and Robin Doss and Biplob Ray and Sutharshan Rajasegarar and Sujan Chowdhury},
        title={IoT Insider Attack - Survey},
        proceedings={Smart Grid and Internet of Things. Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings},
        proceedings_a={SGIOT},
        year={2020},
        month={6},
        keywords={IoT Insider attack Mitigation technique IoT application Machine learning},
        doi={10.1007/978-3-030-49610-4_3}
    }
    
  • Morshed Chowdhury
    Robin Doss
    Biplob Ray
    Sutharshan Rajasegarar
    Sujan Chowdhury
    Year: 2020
    IoT Insider Attack - Survey
    SGIOT
    Springer
    DOI: 10.1007/978-3-030-49610-4_3
Morshed Chowdhury1,*, Robin Doss1,*, Biplob Ray2,*, Sutharshan Rajasegarar1,*, Sujan Chowdhury2,*
  • 1: Deakin University
  • 2: Central Queensland University
*Contact email: morshed.chowdhury@deakin.edu.au, robin.doss@deakin.edu.au, b.ray@cqu.edu.au, suthershan.rajasegarar@deakin.edu.au, s.chowdhury2@cqu.edu.au

Abstract

The “Internet of things” (IoT) creating a perfect storm in the smart world. Due to the availability of internet and capabilities of devices, sensors-based technologies becoming popular day by day. It now opens the opportunities for overcoming many new challenges. Any device with on/off capability connecting through the internet via sensor can be an IoT device which includes a coffee machine, light, hand watch, headphones, washing machine, mobile phones, car, CCTV camera and so on. Simply we can say connecting things to people via the internet and controlling remotely is the great advantage of IoT. In our daily life, the IoT is widely used which includes transportation, health, education, security and so on. Imagine how IoT can make our life easier, based on your set alarm when you wake up if it can notify your coffee machine to prepare coffee for you that will save you time. Despite those advantages, the IoT based system is not free from vulnerabilities. Different types of attacks make the system vulnerable and tried to exploit the system and creating obstacles from its growth. Here we will explore IoT attacks and the relevant technologies associated along with machine learning strategies that exist to overcome those obstacles.