Internet of Things
Lecture 7 - Security Attacks in IoT
Attacks against IoT
2
Image source: https://www.einfochips.com/blog/botnet-attacks-how-iot-devices-become-part-victim-of-such-attacks/
Lecture 7 - Security Attacks in IoT
IoT Botnet – DDoS attack
3
Lecture 7 - Security Attacks in IoT
Image source: https://www.imperva.com/blog/how-to-identify-a-mirai-style-ddos-attack/
Attacks classification
4
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Physical Attacks
5
Lecture 7 - Security Attacks in IoT
Physical Attacks
6
Lecture 7 - Security Attacks in IoT
Physical Attacks
7
Lecture 7 - Security Attacks in IoT
Physical Attacks
8
Lecture 7 - Security Attacks in IoT
Physical Attacks
9
Lecture 7 - Security Attacks in IoT
Countermeasures
against Physical
Attacks
10
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Network Attacks
11
Lecture 7 - Security Attacks in IoT
Network Attacks
12
Network Attacks
13
Lecture 7 - Security Attacks in IoT
Network Attacks
14
Lecture 7 - Security Attacks in IoT
Network Attacks
15
Lecture 7 - Security Attacks in IoT
Network Attacks
16
Lecture 7 - Security Attacks in IoT
Countermeasures against Network Attacks
17
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Lecture 7 - Security Attacks in IoT
Countermeasures against Network Attacks
18
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Software Attacks
19
Lecture 7 - Security Attacks in IoT
Software Attacks
20
Lecture 7 - Security Attacks in IoT
Countermeasures against Software Attacks
21
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Lecture 7 - Security Attacks in IoT
Data Attacks
22
Lecture 7 - Security Attacks in IoT
Data Attacks
23
Lecture 7 - Security Attacks in IoT
Countermeasures against Data Attacks
24
Source: Sengupta et al. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT.
Lecture 7 - Security Attacks in IoT
Real-life Attacks
25
Lecture 7 - Security Attacks in IoT
Real-life Attacks
26
Lecture 7 - Security Attacks in IoT
Real-life Attacks
27
Lecture 7 - Security Attacks in IoT
Real-life Attacks
28
Lecture 7 - Security Attacks in IoT
Tampering Attack Case Study
29
Source: T. Alladi, V. Chamola, B. Sikdar and K. -K. R. Choo, "Consumer IoT: Security Vulnerability Case Studies and Solutions," in IEEE Consumer Electronics Magazine, vol. 9, no. 2, pp. 17-25, 2020.
Tampering Attack Case Study
30
Lecture 7 - Security Attacks in IoT
Eavesdropping Attack Case Study
31
Lecture 7 - Security Attacks in IoT
Source: T. Alladi, V. Chamola, B. Sikdar and K. -K. R. Choo, "Consumer IoT: Security Vulnerability Case Studies and Solutions," in IEEE Consumer Electronics Magazine, vol. 9, no. 2, pp. 17-25, 2020.
Eavesdropping Attack Case Study
32
Lecture 7 - Security Attacks in IoT
Malicious Node Insertion Case Study
33
Lecture 7 - Security Attacks in IoT
Malicious Node Insertion Case Study
34
Lecture 7 - Security Attacks in IoT
Malicious Node Insertion Case Study
35
Lecture 7 - Security Attacks in IoT
Bibliography
36
Lecture 7 - Security Attacks in IoT