Abstract

The Internet of Things (IoT) which is also known as Web 3.0, represents the interconnection between the internet and objects, places and physical environments. IoT has some challenges in security: in fact, the problem exceeds largely data theft. For example, stopping the operation of a factory or causing material or human damage to it, opening the doors of a house or a store to make thefts, remote control of flying vehicle, blocking road traffic of an entire city, etc. To process this problem, it seems necessary to start with an analysis of existing classifications of attacks, and to present their strengths and weaknesses. Then, it would be judicious to study the criteria of each taxonomy in order to extract what may be relevant to our study. Indeed, each of the existing classification has been developed for a specific purpose. We will thus eliminate the least useful criteria and we will suggest others; the goal being to arrive at a general classification of attacks in IoT. To achieve this goal, we propose a new classification of attacks on IoT, based on Classification Tree Method (CTM). In short, we use the CTE (Classification Tree Editor) tool to generate and select the test cases.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.