Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems

Yusuf Muhammad Tukur, Yusuf Sahabi Ali
{"title":"Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems","authors":"Yusuf Muhammad Tukur, Yusuf Sahabi Ali","doi":"10.1109/ICECCO48375.2019.9043248","DOIUrl":null,"url":null,"abstract":"A lot of fascinating capabilities are being presented by the Internet of Things (IoT) since its inception, which has made and still makes it gather so much interest. As a result, it is being deployed in many domains and particularly in modern computation and intelligent processing demand in businesses and government organizations. Nevertheless, the IoT system has become susceptible to different physical and cyberattacks due to its widespread applications, including the insider threat which can be significantly damaging and harmful. In this work, we demonstrate the effects insider attack could have on an IoT system. We built a working IoT system prototype to measure and send environmental temperature data to an IoT platform over The Things Network gateway using LoRaWAN. We set up our experiments both indoors and outdoors and conducted successful insider attacks on the IoT system without tampering with the system components. The results show that insider threats have significant and overreaching effect on IoT system, which justifies the need to focus research on protecting the system from attacks by insiders at the perception layer, which are often successful, affect the integrity of entire system data and can be highly destructive.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCO48375.2019.9043248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

A lot of fascinating capabilities are being presented by the Internet of Things (IoT) since its inception, which has made and still makes it gather so much interest. As a result, it is being deployed in many domains and particularly in modern computation and intelligent processing demand in businesses and government organizations. Nevertheless, the IoT system has become susceptible to different physical and cyberattacks due to its widespread applications, including the insider threat which can be significantly damaging and harmful. In this work, we demonstrate the effects insider attack could have on an IoT system. We built a working IoT system prototype to measure and send environmental temperature data to an IoT platform over The Things Network gateway using LoRaWAN. We set up our experiments both indoors and outdoors and conducted successful insider attacks on the IoT system without tampering with the system components. The results show that insider threats have significant and overreaching effect on IoT system, which justifies the need to focus research on protecting the system from attacks by insiders at the perception layer, which are often successful, affect the integrity of entire system data and can be highly destructive.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
演示内部攻击对物联网(IoT)系统感知层的影响
自物联网(IoT)诞生以来,它已经展示了许多迷人的功能,这已经并且仍然使它引起了人们的兴趣。因此,它被部署在许多领域,特别是在企业和政府组织的现代计算和智能处理需求中。然而,由于其广泛的应用,物联网系统已经变得容易受到不同的物理和网络攻击,包括可能具有重大破坏性和危害性的内部威胁。在这项工作中,我们展示了内部攻击可能对物联网系统产生的影响。我们构建了一个工作的物联网系统原型,使用LoRaWAN通过物联网网关测量环境温度数据并将其发送到物联网平台。我们在室内和室外都进行了实验,并在不篡改系统组件的情况下对物联网系统进行了成功的内部攻击。研究结果表明,内部威胁对物联网系统具有重大且深远的影响,因此有必要重点研究如何保护系统免受感知层内部人员的攻击,这些攻击通常是成功的,会影响整个系统数据的完整性,并可能具有高度破坏性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Investigation into Peer-to-Peer Network Security Using Wireshark Greenhouse Monitoring and Control System with an Arduino System Transfer Learning Based Histopathologic Image Classification for Burns Recognition Modelling And Realization of a Compact CPW Transmission Lines Using 3D Mmics Technology in ADS Momentum Review of Advances in Machine Learning Based Protein Secondary Structure Prediction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1