Abstract

Internet of Things (IoT) is an active research area. Because in Springer database, the number of “IoT attacks” (Articles & Chapter) indicates 7625 Results, that means a trend that research on IoT is becoming increasingly popular. Security and privacy are challenging tasks. Hence, it is essential to pay attention during the basic stages in planning and building the IoT, to avoid any danger or risk due to its widespread in sensitive areas in most countries such as national defense sites, various industries, and military sites… and in order to develop new reliable applications and systems. Moreover, “safety” is a basic criterion for IoT quality and a prerequisite for trusting and ensuring its viability. Security in IoT is more important and essential because IoT devices share sensitive data with other devices, peoples. So, the leading companies in this field should consider cybersecurity as a top priority. In this chapter, we survey and describe different attack surfaces in IoT. To do this, it seems necessary to start with an analysis of existing classifications of IoT attacks and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classifications has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.