IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Combating Man-in-the-Middle Attacks within IoT Systems


    Author(s): OATU, Laura

    Quick view | Full article | Citations | Views: 170


    Author(s) keywords: , , , ,


    Reference keywords: , ,


    Abstract:

    In the last few years, the number of internet-connected devices has grown significantly, from smart washing machines and other electrical appliances to baby monitors. Along with this growth, the number of cyber-attacks has also increased. That's why cyber security is more important than ever. Personal data being a very precious resource and at the same time a very powerful tool. The present article aims to bring a new implementation of information security methods against attacks such Man-in-the-Middle without affecting the performance of the devices and without making everyday use difficult.



    References:

    [1]. A. S. Gillis, "What is the internet of things," March 2022. [Online]. Available: https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT.
    [2]. E. Lacey, "Wired," 17 August 2021. [Online]. Available: https://www.wired.com/story/kalay-iot-bug-video-feeds/.
    [3]. J. Melnick, "Netwrix," 15 May 2018 . [Online]. Available: Top 10 Most Common Types of Cyber Attacks.
    [4]. D. Lom, 29 Jan 2014. [Online]. Available: https://www.nbcnews.com/tech/security/houston-couples-baby-monitor-hacked-used-watch-infant-n18531.
    [5]. 2019, Internet of things (IoT) security threats and concerns worldwide as of late, 31 Mar 2023. [Online]. Available: https://www.statista.com/statistics/1202640/internet-of-things-security-concerns/.
    [6]. Waveshare ESP32-CAM, Feb 2018. [Online]. Available: https://www.aliexpress.com/item/4000000845941.html?pdp_npi=2%40dis%21USD%2114.99%2113.64%21%21%21%21%21%40211675c516823574806677280ec6d3%2110000000000411791%21affd&dp=571088-102596.73329037&aff_fcid=4c7664f0b4944d619c5a690cf029896b-1682357481040-00390&aff.
    [7]. CAM esp32, [Online]. Available: https://makerselectronics.com/product/esp32-cam-mb-micro-usb-download-module-for-esp32-cam.



    Additional Information

    Article Title: Combating Man-in-the-Middle Attacks within IoT Systems
    Author(s): OATU, Laura
    Date of Publication: 2024-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2024.01.05
    Issue: Volume 13, Issue 1, Year 2024
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 59-65 (7 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.