Abstract

Internet of Things (IoT) paradigm became particularly popular in the last couple of years in such a way that the devices are present in almost every home across the globe. Using cheap components one can connect any device to the internet and enable information collecting from the environment, making everyday life a lot easier. Even though it does bring multiple advantages to the table, at the same time it brings certain challenges and vulnerabilities that need to be addressed. In this paper we focus on Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks and we provide a review of the current architecture of Internet of Things which is prone to these.

Highlights

  • Internet of Things (IoT) as a term was firstly introduced in 1999 by Kevin Ashton [1]

  • The remainder of the paper is organized as follows: Section II presents related works on the topic of Dos, Distributed Denial of Service (DDoS) and IoT; Section III discusses the current architecture of IoT and possible improvements and Section V is devoted to the conclusion

  • Tamanna [18] discussed about the cloud computing, the form of IoT, that has taken the computing from the desktop to the Internet, and the DDoS attacks that happen in this cloud environment

Read more

Summary

Introduction

Internet of Things (IoT) as a term was firstly introduced in 1999 by Kevin Ashton [1]. It represents a network of devices that has the ability to connect and provide communication for billions of things simultaneously This kind of network does not require expensive components but can be made out of cheap sensors and interconnected objects, which collect information from the environment and enable the improvements in the way we live. The devices are based on client/server centralized model and consist of three-layer architecture with some additional helper layers: perception (collects information from the environment), network (controls processing of information) and application layer (contains business logic) [4] Certain elements of this architecture are prone to particular attacks that threaten the security of IoT devices. The remainder of the paper is organized as follows: Section II presents related works on the topic of Dos, DDoS and IoT; Section III discusses the current architecture of IoT and possible improvements and Section V is devoted to the conclusion

Literature review
Layers of architecture
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.