The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures

V. Rao, R. Marshal, K. Gobinath
{"title":"The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures","authors":"V. Rao, R. Marshal, K. Gobinath","doi":"10.1109/ISEA-ISAP54304.2021.9689704","DOIUrl":null,"url":null,"abstract":"The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689704","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网供应链攻击趋势——漏洞和预防措施
新世纪人们的生活方式将分为“新冠前”和“后”两种。这一流行病影响到每一个国家和每一个部门。即使在疫情期间,物联网也帮助人类取得了进步。随着行业将办公室转移到家中,物联网得到了迅猛发展。这也增加了威胁形势,攻击也在增加。物联网设备可能会受到几次网络攻击。然而,供应链攻击仍然是最大的威胁,因为应对措施非常困难。除此之外,供应链攻击很难在网络中检测到。在大多数情况下,它们没有被注意到,它们被用来发动间谍活动和勒索软件攻击。与其他攻击相比,供应链攻击的影响也非常大。物联网设备的数量将突飞猛进,有必要在网络中采取主动措施来减轻此类攻击。在本文中,详细讨论了物联网供应链的要素,这些攻击背后的动机,供应链中的漏洞以及最近的攻击。为了减轻物联网环境下的供应链攻击,提出了可在各个层面采取的防范措施。这些措施可以作为最佳实践应用于任何智能网络环境中,以应对供应链攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
[Copyright notice] The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI Sponge based lightweight authentication mechanism for RFID tags
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1