Abstract

Internet of Things (IoT) networks have the potential to drastically change our daily lives with a diverse set of applications. Healthcare, manufacturing, transportation and various other industries may encounter their impacts. As the IoT nodes evolve, it is only natural to expect an increase in their capabilities. Cognitive IoT (CIoT) networks contain IoT nodes with cognitive capabilities that can sense, and analyze the environment. These nodes can also act based on their analysis results. With such a potential, CIoT networks may also become a target for malicious users or attackers. In this chapter, we provide an overview of the main security requirements. Main attack types are summarized. Possible attacks on the CIoT nodes, including primary user emulation attacks, sensing data falsification attacks, objective function attacks and eavesdropping attacks are detailed. A case study targeting primary user emulation and sensing data falsification attacks based on a trust metric is detailed. Open issues are also highlighted.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call