Comprehensive Analysis of Malevolent Attacks and Security Challenges in Unauthorized Access to IoT Devices

Authors

  • Jammana Lalu Prasad Associate Professor, Department of Computer Science and Engineering, ISTS Women's Engineering College (A), Rajahmundry, Andhra Pradesh, India
  • C. Sushama Associate Professor, Department of Computer Science & Engineering, Mohan Babu University, Tirupati, Andhra Pradesh, India
  • Kavitha Chekuri Assistant Professor, Department of Computer Science & Engineering, Raghu Engineering College(A), Visakhapatnam, Andhra Pradesh, India

Keywords:

malevolent attack, unauthorised access, data breach, Man-in-the-Middle attack, botnet, cyber-attacks

Abstract

This study provides an in-depth exploration of malevolent attacks targeting Internet of Things (IoT) devices and the associated security issues stemming from unauthorized access. It presents a detailed examination of different types of attacks, including data theft, device malfunctions, and the dissemination of false results. The study also addresses the security concerns raised by unauthorized attacks and proposes effective solutions. Furthermore, it offers comprehensive insights into safeguarding IoT devices and data, presenting advanced preventive measures to counter malevolent and unauthorized attacks.

References

Colin Tankard, Digital Pathways. The security issues of the Internet of Things. Comput Fraud Secur. 2015 Sep; 2015(9): 11–14.

Manyika J, Chui M, Bisson P, Woetzel J, Dobbs R, Bughin J, Aharon D. Unlocking the potential of the Internet of Things. McKinsey Global Institute; 2015 Jun. Accessed Aug 2015. www.mckinsey.com/insights/business_technology/the_Internet_of_things_the_value_of_digitizing_the_physical_world.

OWASP. Internet of Things Top 10 Projects. [Online]. OWASP.AccessedAug2015. www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project.

Alshanbari HS. Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. 2021; 80(11): 16549–16564. https://doi.org/10.1007/s11042-020-08814-9

Arpacı B, Kurt E, Çelik K, Ciylan B. Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit. J Electr Eng Technol. 2020; 15(21): 1413–1429.

Banu SA, Amirtharajan R. A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput. 2020; 58(7): 1445–1458.

Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L. A survey of lightweight-cryptography implementations. IEEE Des Test. 2007; 24(6): 522–533

Gupta M, Gupta KK, Shukla PK. Session key-based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl. 2021; 80(10): 10391–10416. https://doi.org/10.1007/s11042-020-10116-z

Koo WK, Lee H, Kim YH, Lee DH. Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. In 2008 IEEE international conference on information security and assurance (Isa 2008). 2008 Apr; 73–76.

Liu B, Li Y, Zeng B, Lei C. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front Comput Sci. 2016; 10(3): 543–558.

Khan S, Ibrahim MS, Khan KA, Ebrahim M. Security analysis of secure force algorithm for wireless sensor networks. ArXiv preprint arXiv:1509.00981. 2015.

Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS. A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl. 2020; 79(25–26): 17669–17705. https://doi.org/10.1007/s11042-020-08645-8.

Milad AA, Muda HZ, Noh ZA, Algaet MA. Comparative study of performance in cryptography algorithms (blowfish and Skipjack). J Comput Sci. 2012; 8(7): 1191–1197.

Weber Lauren. Go ahead, hit the snooze button. Wall St J. 2013 Jan 23.

Ubl Stephen J. Public policy implications for using remote monitoring technology to treat diabetes. J Diabetes Sci Technol. 2007 May; 1(3): 436–9.

Published

2023-10-28